CVE-2023-29440

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in the Simple Job Board WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. Attackers can create malicious requests that execute when an admin visits a compromised page, potentially modifying job board settings or content. All WordPress sites using Simple Job Board plugin version 2.10.3 or earlier are affected.

💻 Affected Systems

Products:
  • PressTigers Simple Job Board WordPress Plugin
Versions: <= 2.10.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Simple Job Board plugin enabled. Vulnerability affects all default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify job board settings, delete job listings, or potentially gain administrative access to the WordPress site if combined with other vulnerabilities.

🟠

Likely Case

Attackers modify job board content, delete job postings, or change application settings without authorization.

🟢

If Mitigated

With proper CSRF protections and user awareness, impact is minimal as legitimate actions require user interaction with malicious content.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking authenticated users into clicking malicious links or visiting compromised pages.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.10.4

Vendor Advisory: https://wordpress.org/plugins/simple-job-board/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Simple Job Board plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.10.4+ from WordPress repository and manually update.

🔧 Temporary Workarounds

CSRF Protection via WordPress Nonces

all

Implement custom nonce verification for Simple Job Board forms

Add wp_nonce_field() to plugin forms and verify with wp_verify_nonce()

Disable Plugin

all

Temporarily disable Simple Job Board plugin until patched

Navigate to WordPress admin > Plugins > Simple Job Board > Deactivate

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attempts
  • Educate administrators about phishing risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Simple Job Board for version number. If version is 2.10.3 or earlier, system is vulnerable.

Check Version:

wp plugin list --name=simple-job-board --field=version

Verify Fix Applied:

Verify plugin version is 2.10.4 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed form submissions from same IP
  • Unusual admin actions without corresponding user sessions

Network Indicators:

  • HTTP POST requests to job board endpoints without proper referrer headers
  • Suspicious cross-origin requests

SIEM Query:

source="wordpress.log" AND ("simple-job-board" OR "job-board") AND ("POST" OR "admin-ajax") AND NOT referer="*your-domain*"

🔗 References

📤 Share & Export