Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

JS Help Desk — Vulnerabilities & Security Advisories 13

All 13 CVE vulnerabilities found in JS Help Desk, with AI-generated Chinese analysis, references, and POCs.

Vendor: JS Help Desk

CVE IDTitleCVSSSeverityPublished
CVE-2026-32535 WordPress JS Help Desk plugin <= 3.0.3 - Insecure Direct Object References (IDOR) vulnerability CWE-639 9.1 -2026-03-25
CVE-2026-32534 WordPress JS Help Desk plugin <= 3.0.3 - SQL Injection vulnerability CWE-89 9.8 -2026-03-25
CVE-2026-24959 WordPress JS Help Desk plugin <= 3.0.1 - SQL Injection vulnerability CWE-89 9.8AICriticalAI2026-02-20
CVE-2025-30878 WordPress JS Help Desk plugin <= 2.9.2 - Arbitrary File Deletion vulnerability CWE-22 8.6 High2025-04-01
CVE-2025-30882 WordPress JS Help Desk plugin <= 2.9.1 - Arbitrary File Download vulnerability CWE-22 7.5 High2025-04-01
CVE-2025-30886 WordPress JS Help Desk plugin <= 2.9.2 - SQL Injection vulnerability CWE-89 9.3 Critical2025-04-01
CVE-2025-30901 WordPress JS Help Desk plugin <= 2.9.2 - Local File Inclusion vulnerability CWE-98 8.1 High2025-04-01
CVE-2025-30880 WordPress JS Help Desk plugin <= 2.9.2 - Broken Access Control vulnerability CWE-862 7.5 High2025-04-01
CVE-2022-46840 WordPress JS Help Desk plugin <= 2.7.1 - Broken Access Control CWE-862 5.4 Medium2024-12-13
CVE-2022-46838 WordPress JS Help Desk plugin <= 2.7.1 - Unauthenticated Settings Change Vulnerability CWE-862 9.1 Critical2024-12-13
CVE-2024-51670 WordPress JS Help Desk plugin <= 2.8.7 - Stored Cross Site Scripting (XSS) vulnerability CWE-79 5.9 Medium2024-11-09
CVE-2023-23679 WordPress JS Help Desk – Best Help Desk & Support Plugin Plugin <= 2.7.7 is vulnerable to Insecure Direct Object References (IDOR) CWE-639 4.6 Medium2023-06-23
CVE-2022-46842 WordPress JS Help Desk plugin <= 2.7.1 is vulnerable to Cross Site Request Forgery (CSRF) CWE-352 5.4 Medium2023-02-02

All 13 known CVE vulnerabilities affecting JS Help Desk with full Chinese analysis, references, and POCs where available.