Help Scout Security & Risk Analysis

wordpress.org/plugins/help-scout

Release 6.5.7 License: GPLv2 or later License URI: http://www.gnu.org/licenses/gpl-2.0.html Add a contact form to your website, or embed Help Scout Be …

400 active installs v6.5.7 PHP + WP 4.5+ Updated Dec 1, 2025
contact-form-help-deskdocumentationhelpdesksupport
99
A · Safe
CVEs total1
Unpatched0
Last CVEJan 7, 2025
Safety Verdict

Is Help Scout Safe to Use in 2026?

Generally Safe

Score 99/100

Help Scout has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jan 7, 2025Updated 4mo ago
Risk Assessment

The help-scout plugin version 6.5.7 exhibits a generally good security posture with strong practices in place for SQL query handling and output escaping. The vast majority of outputs are properly escaped, and all SQL queries utilize prepared statements, significantly reducing the risk of SQL injection vulnerabilities. Furthermore, the plugin demonstrates good awareness of security by incorporating nonce and capability checks in its code. The absence of any critical or high-severity taint flows is also a positive indicator, suggesting that user-supplied data is handled with care.

However, a notable concern arises from the static analysis, which reveals one AJAX handler without authentication checks. This creates a potential entry point for attackers to execute actions without proper authorization. While the overall number of entry points is small, this unprotected handler represents a specific vulnerability that needs attention. The plugin's vulnerability history, while showing only one medium-severity CVE in the past, highlights a past pattern of 'Missing Authorization' vulnerabilities. This, combined with the current unprotected AJAX handler, suggests a recurring theme and a potential weakness in how authorization is consistently implemented across all entry points.

In conclusion, while help-scout 6.5.7 employs many robust security measures, the presence of an unprotected AJAX handler is a significant weakness that exposes the plugin to potential unauthorized access or actions. The historical pattern of authorization issues further underscores the need for vigilance in this area. Addressing the unprotected AJAX handler and ensuring thorough authorization checks across all entry points should be the primary focus for improving its security.

Key Concerns

  • Unprotected AJAX handler found
  • Past vulnerability: Missing Authorization
Vulnerabilities
1

Help Scout Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-22512medium · 5.3Missing Authorization

Help Scout <= 6.5.6 - Missing Authorization

Jan 7, 2025 Patched in 6.5.7 (121d)
Code Analysis
Analyzed Mar 16, 2026

Help Scout Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
2
161 escaped
Nonce Checks
5
Capability Checks
4
File Operations
0
External Requests
4
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

99% escaped163 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
login_required (controllers\_Controller.php:305)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Help Scout Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 2

authwp_ajax_hsd_reset_customer_idscontrollers\HelpScout_API.php:25
authwp_ajax_si_save_optionscontrollers\_Settings.php:61
WordPress Hooks 25
actionwp_enqueue_scriptscontrollers\Beacon.php:24
actionwp_footercontrollers\Beacon.php:25
actionparse_requestcontrollers\Forms.php:20
filterhsd_scripts_localizationcontrollers\Forms.php:23
filterquery_varscontrollers\Forms.php:26
actionhsd_plugin_activation_hookcontrollers\_Controller.php:22
actionhsd_shortcodecontrollers\_Controller.php:28
actioninitcontrollers\_Controller.php:30
actionwp_enqueue_scriptscontrollers\_Controller.php:33
actionadmin_enqueue_scriptscontrollers\_Controller.php:34
actionwp_enqueue_scriptscontrollers\_Controller.php:35
actionadmin_enqueue_scriptscontrollers\_Controller.php:36
filtercron_schedulescontrollers\_Controller.php:39
actioninitcontrollers\_Controller.php:40
filteradmin_footer_textcontrollers\_Controller.php:42
filterdoing_it_wrong_trigger_errorcontrollers\_Controller.php:51
actionsprout_settings_pagecontrollers\_Settings.php:49
actionsprout_settingscontrollers\_Settings.php:52
actionadmin_menucontrollers\_Settings.php:55
actionadmin_initcontrollers\_Settings.php:58
actionsprout_meta_boxcontrollers\_Settings.php:68
actionadd_meta_boxescontrollers\_Settings.php:71
filterquery_varscontrollers\_Settings.php:74
actionplugins_loadedload.php:124
actionadmin_headload.php:131
Maintenance & Trust

Help Scout Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 1, 2025
PHP min version
Downloads23K

Community Trust

Rating86/100
Number of ratings6
Active installs400
Developer Profile

Help Scout Developer Profile

BoldGrid

15 plugins · 1.1M total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
841 days
View full developer profile
Detection Fingerprints

How We Detect Help Scout

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/help-scout/resources/front-end/js/hsd-beacon.js
Script Paths
/wp-content/plugins/help-scout/resources/front-end/js/hsd-beacon.js
Version Parameters
help-scout/resources/front-end/js/hsd-beacon.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-hs-campaign-id
JS Globals
BeaconHS
Shortcode Output
[hsd_form][hds_form]
FAQ

Frequently Asked Questions about Help Scout