CVE-2023-48288

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthorized actors to access sensitive information from resume files uploaded through the JobWP WordPress plugin. It affects WordPress sites using JobWP plugin versions up to 2.1, potentially exposing job applicant personal data.

💻 Affected Systems

Products:
  • WordPress Job Board and Recruitment Plugin – JobWP
Versions: n/a through 2.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the JobWP plugin enabled and resume upload functionality active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could download all uploaded resumes containing personal identifiable information (PII), contact details, employment history, and potentially sensitive documents, leading to identity theft, phishing campaigns, or corporate espionage.

🟠

Likely Case

Unauthorized access to resume files containing applicant names, email addresses, phone numbers, and work history, enabling targeted phishing or spam campaigns against job applicants.

🟢

If Mitigated

With proper access controls and file permissions, only authorized administrators can access resume files, preventing data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves improper access control to uploaded files, making exploitation straightforward without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/jobwp/wordpress-jobwp-plugin-2-1-sensitive-data-exposure-on-resume-files-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'JobWP' plugin. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 2.2+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable Resume Uploads

all

Temporarily disable resume upload functionality in JobWP settings to prevent file exposure.

Restrict File Access via .htaccess

linux

Add access restrictions to the uploads directory containing resume files.

Order Deny,Allow
Deny from all
Allow from 127.0.0.1

🧯 If You Can't Patch

  • Disable the JobWP plugin completely until patched.
  • Implement web application firewall rules to block access to resume file paths.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for JobWP version. If version is 2.1 or earlier, the site is vulnerable.

Check Version:

wp plugin list --name=jobwp --field=version

Verify Fix Applied:

After updating, verify JobWP plugin version shows 2.2 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /wp-content/uploads/jobwp/ directories
  • Multiple failed attempts to access resume files from unauthorized IPs

Network Indicators:

  • HTTP GET requests to resume file paths from unauthorized sources
  • Unusual download patterns of .pdf, .doc, .docx files from upload directories

SIEM Query:

source="web_server" AND (url="*jobwp*" AND (extension="pdf" OR extension="doc" OR extension="docx")) AND status=200 AND NOT user_agent="*bot*"

🔗 References

📤 Share & Export