First published: Fri Oct 15 2021(Updated: )
The job-portal WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/admin/jobs_function.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 0.0.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Job-portal | <=0.0.1 |
Uninstall plugin from WordPress site.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39337 is classified as a high severity vulnerability due to its potential for stored Cross-Site Scripting attacks.
To fix CVE-2021-39337, update the Job-portal WordPress plugin to a secure version above 0.0.1, ensuring that all input validation and sanitization are properly implemented.
CVE-2021-39337 affects users with administrative access to the Job-portal WordPress plugin version 0.0.1 and below.
The attack vector for CVE-2021-39337 is via the ~/admin/jobs_function.php file where insufficient input validation allows an attacker to inject arbitrary web scripts.
Yes, CVE-2021-39337 can lead to data loss or manipulation as the stored Cross-Site Scripting may compromise user sessions and expose sensitive information.