First published: Thu Oct 21 2021(Updated: )
The Simple Job Board WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping on the $job_board_privacy_policy_label variable echo'd out via the ~/admin/settings/class-simple-job-board-settings-privacy.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 2.9.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Simple Job Board | <=2.9.4 |
Update to version 2.9.5 or newer.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39328 is a vulnerability in the Simple Job Board WordPress plugin that allows for Stored Cross-Site Scripting.
CVE-2021-39328 has a severity rating of medium, with a severity value of 4.8.
The Simple Job Board WordPress plugin version 2.9.4 is affected by CVE-2021-39328.
CVE-2021-39328 occurs due to insufficient escaping on the $job_board_privacy_policy_label variable, allowing for stored cross-site scripting attacks by attackers with administrative user access.
To fix CVE-2021-39328, update the Simple Job Board WordPress plugin to a version that is not affected by the vulnerability.