Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1891 articles · 106969 vulns · 38/55 feeds (7d)
← Back to list
—
CVE-2026-32535EXPLOITED
JoomSky · JS Help Desk

WordPress JS Help Desk plugin <= 3.0.3 - Insecure Direct Object References (IDOR) vulnerability

Description

Authorization Bypass Through User-Controlled Key vulnerability in JoomSky JS Help Desk js-support-ticket allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JS Help Desk: from n/a through <= 3.0.3.

Affected Products

VendorProductVersions
JoomSkyJS Help Deskn/a

References

  • https://patchstack.com/database/Wordpress/Plugin/js-support-ticket/vulnerability/wordpress-js-help-desk-plugin-3-0-3-insecure-direct-object-references-idor-vulnerability?_s_id=cve(vdb-entry)

Related News (1 articles)

Tier C
VulDB5h ago
CVE-2026-32535 | JoomSky JS Help Desk Plugin up to 3.0.3 on WordPress authorization
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-639
Published3/25/2026
Last enriched4h agov2
Trending Score49
Source articles1
Independent1
Info Completeness7/14
Missing: cvss, epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Version History

v2
Last enriched 4h ago
v2Tier C4h ago

Updated severity to CRITICAL, marked as actively exploited, and corrected exploit availability to false.

severityactivelyExploited
via VulDB
v15h ago

Initial creation