CVE-2024-11925

9.8 CRITICAL

📋 TL;DR

The JobSearch WP Job Board WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to log in as any user by exploiting email verification. All WordPress sites using this plugin up to version 2.6.7 are affected, potentially enabling complete site takeover.

💻 Affected Systems

Products:
  • JobSearch WP Job Board WordPress Plugin
Versions: All versions up to and including 2.6.7
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin active. No special configuration needed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise with administrative access, data theft, malware installation, and defacement.

🟠

Likely Case

Unauthorized access to user accounts, privilege escalation to admin, and potential data exfiltration.

🟢

If Mitigated

Limited impact if plugin is disabled or removed before exploitation.

🌐 Internet-Facing: HIGH - WordPress sites are internet-facing by design and vulnerable to remote exploitation.
🏢 Internal Only: LOW - This primarily affects internet-facing WordPress installations.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowing target user email addresses, which can often be discovered through enumeration or public information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.8 or later

Vendor Advisory: https://codecanyon.net/item/jobsearch-wp-job-board-wordpress-plugin/21066856

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Update JobSearch WP Job Board plugin to version 2.6.8 or higher. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the JobSearch WP Job Board plugin until patched.

wp plugin deactivate jobsearch-wp-job-board

Restrict access with WAF

all

Implement web application firewall rules to block exploitation attempts.

🧯 If You Can't Patch

  • Remove the JobSearch WP Job Board plugin completely from the WordPress installation.
  • Implement strict network access controls and monitor for unauthorized login attempts.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > JobSearch WP Job Board. If version is 2.6.7 or lower, you are vulnerable.

Check Version:

wp plugin get jobsearch-wp-job-board --field=version

Verify Fix Applied:

Verify plugin version is 2.6.8 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login from same IP
  • Unusual user privilege changes
  • Login events for users from unexpected locations

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with user_account_activation action
  • Unusual spikes in authentication requests

SIEM Query:

source="wordpress.log" AND ("user_account_activation" OR "action=user_account_activation")

🔗 References

📤 Share & Export