CVE-2023-48288
📋 TL;DR
This vulnerability allows unauthorized actors to access sensitive information from resume files uploaded through the JobWP WordPress plugin. It affects WordPress sites using JobWP plugin versions up to 2.1, potentially exposing job applicant personal data.
💻 Affected Systems
- WordPress Job Board and Recruitment Plugin – JobWP
📦 What is this software?
Jobwp by Hmplugin
⚠️ Risk & Real-World Impact
Worst Case
Attackers could download all uploaded resumes containing personal identifiable information (PII), contact details, employment history, and potentially sensitive documents, leading to identity theft, phishing campaigns, or corporate espionage.
Likely Case
Unauthorized access to resume files containing applicant names, email addresses, phone numbers, and work history, enabling targeted phishing or spam campaigns against job applicants.
If Mitigated
With proper access controls and file permissions, only authorized administrators can access resume files, preventing data exposure.
🎯 Exploit Status
The vulnerability involves improper access control to uploaded files, making exploitation straightforward without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.2 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/jobwp/wordpress-jobwp-plugin-2-1-sensitive-data-exposure-on-resume-files-vulnerability
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'JobWP' plugin. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 2.2+ from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Disable Resume Uploads
allTemporarily disable resume upload functionality in JobWP settings to prevent file exposure.
Restrict File Access via .htaccess
linuxAdd access restrictions to the uploads directory containing resume files.
Order Deny,Allow
Deny from all
Allow from 127.0.0.1
🧯 If You Can't Patch
- Disable the JobWP plugin completely until patched.
- Implement web application firewall rules to block access to resume file paths.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Installed Plugins for JobWP version. If version is 2.1 or earlier, the site is vulnerable.
Check Version:
wp plugin list --name=jobwp --field=version
Verify Fix Applied:
After updating, verify JobWP plugin version shows 2.2 or later in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to /wp-content/uploads/jobwp/ directories
- Multiple failed attempts to access resume files from unauthorized IPs
Network Indicators:
- HTTP GET requests to resume file paths from unauthorized sources
- Unusual download patterns of .pdf, .doc, .docx files from upload directories
SIEM Query:
source="web_server" AND (url="*jobwp*" AND (extension="pdf" OR extension="doc" OR extension="docx")) AND status=200 AND NOT user_agent="*bot*"