CVE-2024-7761

6.1 MEDIUM

📋 TL;DR

This stored cross-site scripting (XSS) vulnerability in the Simple Job Board WordPress plugin allows attackers to inject malicious scripts that execute when viewed by administrators or editors. The vulnerability affects WordPress sites using Simple Job Board versions before 2.12.2, potentially leading to account takeover through backdoor installation.

💻 Affected Systems

Products:
  • Simple Job Board WordPress Plugin
Versions: All versions before 2.12.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Simple Job Board plugin enabled. Attack requires editor-level privileges to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise through administrator account takeover, leading to data theft, malware distribution, or complete site defacement.

🟠

Likely Case

Editor or administrator account compromise leading to unauthorized content modification, privilege escalation, or additional backdoor installation.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, potentially only affecting specific plugin functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires editor-level access. Public proof-of-concept available through WPScan reference.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.12.2

Vendor Advisory: https://wpscan.com/vulnerability/ae8c1c91-3574-4da5-b5dc-d4e3feccac7e/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Simple Job Board plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.12.2+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable Simple Job Board plugin until patched

wp plugin deactivate simple-job-board

Restrict Editor Access

all

Temporarily remove editor privileges from untrusted users

wp user update <user_id> --role=subscriber

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads
  • Enable Content Security Policy (CSP) headers to restrict script execution

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Simple Job Board version number

Check Version:

wp plugin get simple-job-board --field=version

Verify Fix Applied:

Verify plugin version is 2.12.2 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual plugin file modifications
  • Multiple failed login attempts from editor accounts
  • Suspicious script tags in job board submissions

Network Indicators:

  • Unexpected outbound connections from WordPress server
  • Suspicious JavaScript payloads in HTTP requests

SIEM Query:

source="wordpress.log" AND "simple-job-board" AND ("script" OR "onerror" OR "javascript:")

🔗 References

📤 Share & Export