Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 29 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 26 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Joomsky
Joomsky js Help Desk Wordpress Wordpress wordpress |
|
| Vendors & Products |
Joomsky
Joomsky js Help Desk Wordpress Wordpress wordpress |
Wed, 25 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authorization Bypass Through User-Controlled Key vulnerability in JoomSky JS Help Desk js-support-ticket allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JS Help Desk: from n/a through <= 3.0.3. | |
| Title | WordPress JS Help Desk plugin <= 3.0.3 - Insecure Direct Object References (IDOR) vulnerability | |
| Weaknesses | CWE-639 | |
| References |
|
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2026-04-29T09:52:01.258Z
Reserved: 2026-03-12T11:12:24.777Z
Link: CVE-2026-32535
Updated: 2026-03-26T13:17:01.528Z
Status : Deferred
Published: 2026-03-25T17:17:07.160
Modified: 2026-04-29T10:17:21.127
Link: CVE-2026-32535
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:30:38Z