CVE-2024-13428

5.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to delete arbitrary company logos in the WP Job Portal WordPress plugin due to missing validation on user-controlled keys. All WordPress sites using this plugin up to version 2.2.6 are affected, potentially disrupting recruitment system functionality.

💻 Affected Systems

Products:
  • WP Job Portal – A Complete Recruitment System for Company or Job Board
Versions: All versions up to and including 2.2.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin enabled; no specific OS or configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers delete all company logos, causing visual disruption, loss of branding, and potential business impact for job boards or companies relying on the plugin.

🟠

Likely Case

Attackers delete random or targeted company logos, leading to minor site disruption and administrative overhead to restore logos.

🟢

If Mitigated

If proper access controls and input validation are in place, no unauthorized deletions occur, limiting impact to legitimate users only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward via crafted requests to the deleteCompanyLogo() function without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.7

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3229608/wp-job-portal/tags/2.2.7/modules/company/model.php?old=3216415&old_path=wp-job-portal%2Ftags%2F2.2.6%2Fmodules%2Fcompany%2Fmodel.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WP Job Portal' and update to version 2.2.7 or later. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the WP Job Portal plugin to prevent exploitation until patched.

wp plugin deactivate wp-job-portal

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests targeting the deleteCompanyLogo() function.
  • Restrict access to the plugin's admin interfaces using IP whitelisting or authentication hardening.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins; if version is 2.2.6 or lower, it is vulnerable.

Check Version:

wp plugin get wp-job-portal --field=version

Verify Fix Applied:

After updating, confirm the plugin version is 2.2.7 or higher in the same location.

📡 Detection & Monitoring

Log Indicators:

  • Unusual DELETE or POST requests to paths containing 'deleteCompanyLogo' or similar plugin endpoints from unauthenticated IPs.

Network Indicators:

  • HTTP traffic patterns targeting the plugin's company module without authentication headers.

SIEM Query:

source="web_logs" AND (uri="*deleteCompanyLogo*" OR user_agent="*wp-job-portal*") AND http_method="POST" AND auth_status="unauthenticated"

🔗 References

📤 Share & Export