First published: Fri Apr 25 2025(Updated: )
The JobSearch WP Job Board plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.8.8. This is due to improper configurations in the 'jobsearch_xing_response_data_callback', 'set_access_tokes', and 'google_callback' functions. This makes it possible for unauthenticated attackers to log in as the first connected Xing user, or any connected Xing user if the Xing id is known. It is also possible for unauthenticated attackers to log in as the first connected Google user if the user has logged in, without subsequently logging out, in thirty days. The vulnerability was partially patched in version 2.8.4.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP Job Board | <=2.8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11917 has been rated as a high severity vulnerability due to its potential for authentication bypass.
To fix CVE-2024-11917, update the JobSearch WP Job Board plugin to version 2.8.9 or later.
CVE-2024-11917 affects all versions of the JobSearch WP Job Board plugin up to and including version 2.8.8.
CVE-2024-11917 poses a serious threat as it allows unauthorized access to user account functionalities.
There is no recommended workaround for CVE-2024-11917; users should update to the latest version to mitigate the risk.