9.8
CVE-2024-11286
- EPSS 0.64%
- Veröffentlicht 14.03.2025 05:15:40
- Zuletzt bearbeitet 08.07.2025 15:17:34
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
WP JobHunt <= 7.1 - Authentication Bypass
The WP JobHunt plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 7.1. This is due to the plugin not properly verifying a user's identity prior to authenticating them through the cs_parse_request() function. This makes it possible for unauthenticated attackers to to log in to any user's account, including administrators.
Mögliche Gegenmaßnahme
WP JobHunt: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
WP JobHunt
Version
* - 7.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Chimpgroup ≫ Jobcareer SwPlatformwordpress Version <= 7.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.64% | 0.697 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.