5.4
CVE-2025-31867
- EPSS 0.22%
- Veröffentlicht 01.04.2025 15:16:28
- Zuletzt bearbeitet 23.01.2026 20:25:44
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
JS Job Manager <= 2.0.2 - Authenticated Insecure Direct Object Reference
Authorization Bypass Through User-Controlled Key vulnerability in JoomSky JS Job Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects JS Job Manager: from n/a through 2.0.2.
Mögliche Gegenmaßnahme
JS Job Manager: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
JS Job Manager
Version
*-2.0.2
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Joomsky ≫ Js Job Manager SwPlatformwordpress Version <= 2.0.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.22% | 0.442 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| audit@patchstack.com | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
|
CWE-639 Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.