CVE-2025-14467

4.4 MEDIUM

📋 TL;DR

The WP Job Portal WordPress plugin allows authenticated attackers with Editor-level access or higher to inject malicious scripts into job descriptions due to insufficient input sanitization. This stored XSS vulnerability enables script execution when users view affected pages, potentially leading to session hijacking or credential theft. Only WordPress multi-site installations or sites with unfiltered_html disabled are affected.

💻 Affected Systems

Products:
  • WP Job Portal WordPress Plugin
Versions: All versions up to and including 2.3.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ✅ No
Notes: Only vulnerable in WordPress multi-site installations OR when unfiltered_html capability is disabled for users

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator credentials, take over the WordPress site, install backdoors, and compromise user data.

🟠

Likely Case

Attackers hijack user sessions, redirect visitors to malicious sites, or deface job listing pages.

🟢

If Mitigated

Limited impact if proper access controls restrict Editor roles and regular security monitoring is in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access with Editor role or higher; exploitation is straightforward via job creation/editing interface

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.0 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/wp-job-portal/

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find WP Job Portal plugin
4. Click 'Update Now' if update available
5. If no update available, download version 2.4.0+ from WordPress repository
6. Deactivate old plugin, upload new version, activate

🔧 Temporary Workarounds

Restrict Editor Role Access

all

Limit users with Editor role or higher to trusted personnel only

Enable unfiltered_html Capability

all

For single-site installations, ensure unfiltered_html is enabled to bypass vulnerability

🧯 If You Can't Patch

  • Temporarily disable the WP Job Portal plugin until patched
  • Implement strict role-based access control and audit all users with Editor privileges

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → WP Job Portal → Version number. If version is 2.3.9 or earlier, you are vulnerable if using multi-site OR unfiltered_html disabled.

Check Version:

wp plugin list --name='WP Job Portal' --field=version

Verify Fix Applied:

After updating, verify plugin version shows 2.4.0 or later in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual job creation/editing activity by Editor users
  • Multiple script tags in job description content

Network Indicators:

  • Unexpected external script loads from job listing pages

SIEM Query:

source="wordpress" AND (plugin="wp-job-portal" AND (event="job_created" OR event="job_updated"))

🔗 References

📤 Share & Export