Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%

Awesome Support — Vulnerabilities & Security Advisories 14

All 14 CVE vulnerabilities found in Awesome Support, with AI-generated Chinese analysis, references, and POCs.

Vendor: Unknown

CVE IDTitleCVSSSeverityPaused
CVE-2025-58662 WordPress Awesome Support plugin <= 6.3.5 - Deserialization of untrusted data vulnerability CWE-502 7.2 High2025-09-22
CVE-2025-53340 WordPress Awesome Support plugin <= 6.3.6 - Sensitive Data Exposure vulnerability CWE-862 5.3 Medium2025-09-09
CVE-2024-54289 WordPress Awesome Support plugin <= 6.3.1 - Broken Access Control vulnerability CWE-862 6.5 Medium2024-12-13
CVE-2023-48324 WordPress Awesome Support HelpDesk plugin <= 6.1.4 - Broken Access control vulnerability CWE-862 7.1 -2024-12-09
CVE-2023-49757 WordPress Awesome Support plugin <= 6.1.10 - Broken Access Control + CSRF vulnerability CWE-862 7.1 -2024-12-09
CVE-2023-49857 WordPress Awesome Support plugin <= 6.1.7 - Broken Access Control vulnerability CWE-862 7.1 -2024-12-09
CVE-2023-51537 WordPress Awesome Support plugin <= 6.1.5 - Broken Access Control vulnerability CWE-862 5.3 Medium2024-06-12
CVE-2024-35741 WordPress Awesome Support plugin <= 6.1.7 - Broken Access Control vulnerability CWE-862 4.3 Medium2024-06-10
CVE-2024-24716 WordPress Awesome Support plugin <= 6.1.6 - Broken Access Control vulnerability CWE-862 5.4 Medium2024-06-09
CVE-2024-30539 WordPress Awesome Support plugin <= 6.1.7 - Broken Access Control vulnerability CWE-862 5.3 Medium2024-06-09
CVE-2023-5355 Awesome Support < 6.1.5 - Submitter+ Arbitrary File Deletion 8.1 -2023-11-06
CVE-2023-5352 Awesome Support < 6.1.5 - Insufficient permission check in wpas_edit_reply 4.3 -2023-11-06
CVE-2023-5354 Awesome Support < 6.1.5 - Reflected Cross-Site Scripting 6.1 -2023-11-06
CVE-2022-3511 Awesome Support < 6.1.2 - Subscriber+ Arbitrary Exported Tickets Download 6.5 -2022-11-28

All 14 known CVE vulnerabilities affecting Awesome Support with full Chinese analysis, references, and POCs where available.