CVE-2025-30966

5.4 MEDIUM

📋 TL;DR

A path traversal vulnerability in the WPJobBoard WordPress plugin allows attackers to access files outside the intended directory. This affects all WPJobBoard plugin installations, potentially exposing sensitive server files to unauthorized users.

💻 Affected Systems

Products:
  • WPJobBoard WordPress Plugin
Versions: All versions before 5.11.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable WPJobBoard plugin versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive server files like wp-config.php, exposing database credentials and potentially leading to full site compromise.

🟠

Likely Case

Unauthorized access to configuration files, source code, or other sensitive files stored on the web server.

🟢

If Mitigated

Limited file access restricted by server permissions, with no critical data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically have low exploitation complexity and may be exploited without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.11.1

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wpjobboard/vulnerability/wordpress-wpjobboard-plugin-5-11-1-path-traversal-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WPJobBoard and update to version 5.11.1 or later. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Disable WPJobBoard Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate wpjobboard

Restrict File Access via .htaccess

linux

Add directory traversal protection rules to web server configuration.

RewriteCond %{REQUEST_URI} \.\. [NC]
RewriteRule .* - [F,L]

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block path traversal patterns
  • Restrict server file permissions and implement principle of least privilege

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for WPJobBoard version below 5.11.1.

Check Version:

wp plugin get wpjobboard --field=version

Verify Fix Applied:

Confirm WPJobBoard plugin version is 5.11.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' or '..\' patterns
  • Unusual file access attempts to sensitive paths

Network Indicators:

  • HTTP requests with encoded directory traversal sequences (%2e%2e%2f)

SIEM Query:

source="web_access.log" AND (uri="*../*" OR uri="*..\\*")

🔗 References

📤 Share & Export