7.5
CVE-2024-11283
- EPSS 0.31%
- Veröffentlicht 14.03.2025 05:15:37
- Zuletzt bearbeitet 08.07.2025 15:25:15
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
WP JobHunt <= 7.1 - Authentication Bypass to Candidate
The WP JobHunt plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 7.1. This is due to wp_ajax_google_api_login_callback function not properly verifying a user's identity prior to authenticating them. This makes it possible for unauthenticated attackers to access arbitrary candidate accounts.
Mögliche Gegenmaßnahme
WP JobHunt: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
WP JobHunt
Version
* - 7.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Chimpgroup ≫ Jobcareer SwPlatformwordpress Version <= 7.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.31% | 0.536 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-289 Authentication Bypass by Alternate Name
The product performs authentication based on the name of a resource being accessed, or the name of the actor performing the access, but it does not properly check all possible names for that resource or actor.