CVE-2024-43245

9.8 CRITICAL

📋 TL;DR

An unauthenticated privilege escalation vulnerability in the eyecix JobSearch WordPress plugin allows attackers to take over administrator accounts without credentials. This affects all WordPress sites running JobSearch versions up to 2.3.4. Attackers can gain full control of vulnerable WordPress installations.

💻 Affected Systems

Products:
  • eyecix JobSearch WordPress Plugin
Versions: n/a through 2.3.4
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable JobSearch plugin versions installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of WordPress site with administrative access, allowing data theft, defacement, malware injection, and lateral movement to other systems.

🟠

Likely Case

Unauthenticated attackers gain administrative privileges and install backdoors, steal sensitive data, or use the site for phishing/malware distribution.

🟢

If Mitigated

With proper network segmentation and monitoring, impact limited to the WordPress instance with potential data breach but contained lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Patchstack database confirms unauthenticated account takeover with public technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.5 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/wp-jobsearch/wordpress-jobsearch-plugin-2-3-4-unauthenticated-account-takeover-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find JobSearch plugin. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 2.3.5+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable JobSearch Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate wp-jobsearch

Restrict Access with WAF

all

Block requests to JobSearch plugin endpoints using web application firewall.

🧯 If You Can't Patch

  • Isolate WordPress instance in separate network segment with strict egress filtering
  • Implement application-level monitoring for privilege escalation attempts and unusual admin activity

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → JobSearch version. If version is 2.3.4 or earlier, system is vulnerable.

Check Version:

wp plugin get wp-jobsearch --field=version

Verify Fix Applied:

Verify JobSearch plugin version is 2.3.5 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin user creation/modification logs
  • Multiple failed login attempts followed by successful admin login from new IP
  • POST requests to JobSearch-specific endpoints from unauthenticated users

Network Indicators:

  • HTTP requests to /wp-content/plugins/wp-jobsearch/ endpoints from external IPs without authentication

SIEM Query:

source="wordpress.log" AND ("wp-jobsearch" OR "JobSearch") AND ("user_role_changed" OR "admin_login" OR "user_created")

🔗 References

📤 Share & Export