CVE-2023-51545
📋 TL;DR
This vulnerability in the WordPress Job Manager & Career plugin allows attackers to perform Cross-Site Request Forgery (CSRF) attacks that lead to PHP object injection. Attackers can trick authenticated administrators into executing malicious actions, potentially leading to remote code execution. All WordPress sites using affected plugin versions are vulnerable.
💻 Affected Systems
- WordPress Job Manager & Career plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete site compromise, data theft, malware installation, or site defacement.
Likely Case
Privilege escalation, data manipulation, or unauthorized administrative actions via CSRF-triggered object injection.
If Mitigated
Limited impact with proper CSRF protections and input validation in place.
🎯 Exploit Status
Exploit requires tricking authenticated admin user to click malicious link. CSRF leads to PHP object injection.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.4.5 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Job Manager & Career' plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.4.5+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patched.
wp plugin deactivate job-manager-career
Implement CSRF Protection
allAdd WordPress nonce verification to all plugin forms and AJAX requests.
🧯 If You Can't Patch
- Restrict admin access to trusted networks only
- Implement web application firewall with CSRF and PHP object injection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Job Manager & Career. If version is 1.4.4 or lower, you are vulnerable.
Check Version:
wp plugin get job-manager-career --field=version
Verify Fix Applied:
Verify plugin version is 1.4.5 or higher in WordPress admin plugins page.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to plugin endpoints
- CSRF token validation failures
- Unexpected PHP object unserialization attempts
Network Indicators:
- Malicious requests containing serialized PHP objects
- CSRF attacks targeting plugin endpoints
SIEM Query:
source="wordpress.log" AND ("job-manager-career" OR "wp-admin/admin-ajax.php") AND (POST OR "serialize" OR "unserialize")
🔗 References
- https://patchstack.com/database/vulnerability/job-manager-career/wordpress-job-manager-career-plugin-1-4-4-cross-site-request-forgery-csrf-to-php-object-injection-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/job-manager-career/wordpress-job-manager-career-plugin-1-4-4-cross-site-request-forgery-csrf-to-php-object-injection-vulnerability?_s_id=cve