Deskpro Knowledge Base Voting Manipulation

CVE-2026-XXXXX - Unauthenticated vote manipulation vulnerability in Deskpro knowledgebase

Paul Hutchinson

Table of content
  1. Deskpro Knowledge Base Voting Manipulation (CVE-2026-XXXXX)
  2. Summary
  3. Product Information
  4. Vulnerability Details
  5. Technical Description
  6. Proof of Concept
  7. Impact Assessment
  8. Business Impact
  9. CVSS v4.0 Score
  10. Disclosure Timeline
  11. Vendor Response
  12. Recommended Remediation
  13. Vendor-Side Fixes (Recommended)
  14. User-Side Mitigations
  15. CVE Information
  16. References
  17. Credits
  18. Responsible Disclosure

Deskpro Knowledge Base Voting Manipulation (CVE-2026-XXXXX)

Disclosure Date: 6 June 2026
Researcher: Paul Hutchinson, Lexiphanic Ltd
Severity: MEDIUM (CVSS v4.0: 4.3)
Status: Disclosed - Vendor does not consider this a security vulnerability

Summary

The Deskpro knowledge base voting system allows unauthenticated manipulation of article votes due to missing request validation, authentication requirements, and rate limiting. This enables any party to artificially inflate or reduce article vote counts, compromising data integrity and feedback metrics across all exposed Deskpro instances.

Product Information

Vulnerability Details

Technical Description

The voting mechanism for knowledge base articles lacks fundamental security controls. The vote-up and vote-down endpoints accept unauthenticated POST requests without:

This allows unlimited, automated manipulation of vote counts from any source.

Proof of Concept

The following requests can be executed repeatedly without restriction:

curl -X POST https://support.deskpro.com/en-US/kb/articles/1-organize-your-helpdesk-into-departments/vote-down

curl -X POST https://support.deskpro.com/en-US/kb/articles/1-organize-your-helpdesk-into-departments/vote-up

Each invocation immediately affects the stored vote count with no validation or throttling.

Video Demonstration:

Impact Assessment

Business Impact

CVSS v4.0 Score

Score: 4.3 (MEDIUM)

Vector: AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

This represents a data integrity vulnerability rather than direct security access or data exposure.

Disclosure Timeline

Date Event
[PLACEHOLDER_INITIAL_REPORT_DATE] Initial vulnerability report submitted to Deskpro Security Team
[PLACEHOLDER_VENDOR_RESPONSE_DATE] Vendor response received - classified as product behaviour, not a security issue
[PLACEHOLDER_FOLLOWUP_DATE] Follow-up sent noting intent to request CVE for transparency and tracking
[PLACEHOLDER_CVE_REQUEST_DATE] CVE request submitted to MITRE CNA of Last Resort
6 June 2026 Public disclosure (90 days from initial report)

Vendor Response

Deskpro's security team reviewed the report and responded that the knowledge base voting functionality is intentionally available to unauthenticated users to enable quick visitor feedback. They classified this as product behaviour rather than a security vulnerability.

The vendor indicated they would pass feedback to the relevant team for consideration of future improvements, such as additional abuse protections.

Despite the vendor's position, I proceeded with a CVE request to ensure transparent tracking across installations, as the absence of validation controls represents a data integrity issue that could have reputational and operational impact on public deployments.

Vendor did not provide additional response or vendor statement after follow-up.

Organizations using Deskpro with public knowledge bases should consider the following mitigations:

  1. Implement authentication requirement - Tie voting actions to authenticated user sessions
  2. Server-side rate limiting - Apply per-user or per-IP throttling (e.g., 5 votes per hour)
  3. CSRF protection - Add token validation to voting endpoints
  4. CAPTCHA integration - Prevent automated abuse with human verification
  5. IP fingerprinting - Track and limit votes from single sources
  6. Cookie-based vote tracking - Use persistent identifiers to prevent duplicate votes

User-Side Mitigations

Until vendor fixes are available:

CVE Information

CVE ID: CVE-2026-XXXXX (pending assignment)
CNA: MITRE CNA of Last Resort
Classification: Data Integrity / Functional Abuse

References

Credits

Discovered by: Paul Hutchinson
Organization: Lexiphanic Ltd
Contact: paul@lexiphanic.co.uk
GitHub: happypaul55

Responsible Disclosure

This vulnerability was disclosed following a 90-day responsible disclosure timeline. The vendor was given opportunity to:

Public disclosure proceeded after the 90-day window, with no fix deployed and no vendor statement provided.


This research was conducted as part of Lexiphanic Ltd's ongoing security research program. If you have questions about this disclosure or would like to report a security issue, please contact paul@lexiphanic.co.uk.