CVE-2024-43931

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code through PHP object injection via deserialization of untrusted data in the eyecix JobSearch WordPress plugin. All WordPress sites running JobSearch plugin versions up to 2.5.3 are affected.

💻 Affected Systems

Products:
  • eyecix JobSearch WordPress Plugin
Versions: n/a through 2.5.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing remote code execution, data theft, and website defacement.

🟠

Likely Case

Remote code execution leading to backdoor installation, data exfiltration, and privilege escalation.

🟢

If Mitigated

Limited impact if proper input validation and deserialization controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available on security research sites.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.4 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/wp-jobsearch/wordpress-jobsearch-wp-job-board-wordpress-plugin-plugin-2-5-3-php-object-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'JobSearch' plugin. 4. Click 'Update Now' if update available. 5. If no update, manually download version 2.5.4+ from WordPress repository.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate wp-jobsearch

Restrict Access

all

Use web application firewall to block deserialization attempts.

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user inputs.
  • Use web application firewall with rules to detect and block deserialization attacks.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > JobSearch version. If version is 2.5.3 or earlier, you are vulnerable.

Check Version:

wp plugin get wp-jobsearch --field=version

Verify Fix Applied:

Verify JobSearch plugin version is 2.5.4 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to jobsearch-related endpoints
  • PHP serialized data in request logs
  • Unexpected file creation/modification

Network Indicators:

  • HTTP requests containing serialized PHP objects
  • Unusual outbound connections from web server

SIEM Query:

source="web_logs" AND (uri="*jobsearch*" OR uri="*wp-jobsearch*") AND (request_body="*O:*" OR request_body="*s:*")

🔗 References

📤 Share & Export