CVE-2024-13428
📋 TL;DR
This vulnerability allows unauthenticated attackers to delete arbitrary company logos in the WP Job Portal WordPress plugin due to missing validation on user-controlled keys. All WordPress sites using this plugin up to version 2.2.6 are affected, potentially disrupting recruitment system functionality.
💻 Affected Systems
- WP Job Portal – A Complete Recruitment System for Company or Job Board
📦 What is this software?
Wp Job Portal by Wpjobportal
⚠️ Risk & Real-World Impact
Worst Case
Attackers delete all company logos, causing visual disruption, loss of branding, and potential business impact for job boards or companies relying on the plugin.
Likely Case
Attackers delete random or targeted company logos, leading to minor site disruption and administrative overhead to restore logos.
If Mitigated
If proper access controls and input validation are in place, no unauthorized deletions occur, limiting impact to legitimate users only.
🎯 Exploit Status
Exploitation is straightforward via crafted requests to the deleteCompanyLogo() function without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.2.7
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WP Job Portal' and update to version 2.2.7 or later. 4. Verify update completes successfully.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily deactivate the WP Job Portal plugin to prevent exploitation until patched.
wp plugin deactivate wp-job-portal
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block requests targeting the deleteCompanyLogo() function.
- Restrict access to the plugin's admin interfaces using IP whitelisting or authentication hardening.
🔍 How to Verify
Check if Vulnerable:
Check the plugin version in WordPress admin under Plugins > Installed Plugins; if version is 2.2.6 or lower, it is vulnerable.
Check Version:
wp plugin get wp-job-portal --field=version
Verify Fix Applied:
After updating, confirm the plugin version is 2.2.7 or higher in the same location.
📡 Detection & Monitoring
Log Indicators:
- Unusual DELETE or POST requests to paths containing 'deleteCompanyLogo' or similar plugin endpoints from unauthenticated IPs.
Network Indicators:
- HTTP traffic patterns targeting the plugin's company module without authentication headers.
SIEM Query:
source="web_logs" AND (uri="*deleteCompanyLogo*" OR user_agent="*wp-job-portal*") AND http_method="POST" AND auth_status="unauthenticated"