Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12213: CWE-266 Incorrect Privilege Assignment in http://apusthemes.com/ WP Job Board Pro

0
Critical
VulnerabilityCVE-2024-12213cvecve-2024-12213cwe-266
Published: Wed Feb 12 2025 (02/12/2025, 09:22:49 UTC)
Source: CVE Database V5
Vendor/Project: http://apusthemes.com/
Product: WP Job Board Pro

Description

CVE-2024-12213 is a critical privilege escalation vulnerability in the WP Job Board Pro WordPress plugin (all versions up to 1. 2. 76). It allows unauthenticated attackers to supply the 'role' field during user registration, enabling them to register as administrators without authorization. This flaw arises from incorrect privilege assignment (CWE-266) and requires no user interaction or authentication. Exploitation can lead to full site compromise, including confidentiality, integrity, and availability impacts. No public exploits are known yet, but the high CVSS score (9. 8) indicates severe risk. Organizations using this plugin should urgently apply patches or implement mitigations to prevent unauthorized admin account creation. The threat primarily affects WordPress sites globally, especially those using WP Job Board Pro, with higher risk in countries with large WordPress user bases and targeted industries.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:26:15 UTC

Technical Analysis

CVE-2024-12213 is a critical security vulnerability identified in the WP Job Board Pro plugin for WordPress, affecting all versions up to and including 1.2.76. The vulnerability stems from improper privilege assignment (CWE-266), specifically allowing unauthenticated users to supply the 'role' parameter during the registration process. This flaw enables attackers to escalate privileges by registering accounts with administrative rights without any authentication or user interaction. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is severe, compromising confidentiality, integrity, and availability (C:H/I:H/A:H) of affected WordPress sites. An attacker exploiting this vulnerability can gain full administrative control, leading to potential data theft, site defacement, malware deployment, or further lateral movement within the hosting environment. Although no known exploits are currently reported in the wild, the critical CVSS score of 9.8 underscores the urgency for mitigation. The vulnerability affects a widely used WordPress plugin, increasing the risk surface for many organizations relying on this software for job board functionality on their websites.

Potential Impact

The impact of CVE-2024-12213 is severe and far-reaching. Successful exploitation grants attackers full administrative privileges on vulnerable WordPress sites, enabling complete control over site content, user data, and configurations. This can lead to data breaches involving sensitive user information, unauthorized content modifications, defacement, or the installation of backdoors and malware. The availability of the site can also be compromised through destructive actions or ransomware deployment. Organizations relying on WP Job Board Pro for recruitment or job listing services face reputational damage, operational disruption, and potential regulatory penalties due to data exposure. The vulnerability's ease of exploitation and lack of required authentication make it an attractive target for attackers, increasing the likelihood of widespread compromise. Additionally, compromised sites can be leveraged as part of larger botnets or phishing campaigns, amplifying the threat beyond the initial victim.

Mitigation Recommendations

1. Immediate update: Apply the latest patched version of WP Job Board Pro once released by the vendor. Monitor the vendor's site and trusted security advisories for patch announcements. 2. Temporary access control: Until a patch is available, restrict user registration or disable the registration feature if not essential. 3. Input validation: Implement web application firewall (WAF) rules to block or sanitize requests containing the 'role' parameter during registration attempts. 4. Monitor logs: Actively monitor web server and WordPress logs for suspicious registration attempts or unexpected role assignments. 5. Harden WordPress: Limit administrative privileges to trusted accounts only and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 6. Incident response readiness: Prepare to audit existing user accounts for unauthorized admin accounts and remove any suspicious users. 7. Backup: Maintain regular, secure backups of the website and database to enable recovery in case of compromise. 8. Network segmentation: Isolate the WordPress server to limit lateral movement if compromised. These steps combined reduce the attack surface and mitigate exploitation risk until a vendor patch is applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-04T21:16:33.871Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e32b7ef31ef0b597982

Added to database: 2/25/2026, 9:48:34 PM

Last enriched: 2/26/2026, 4:26:15 AM

Last updated: 2/26/2026, 6:35:30 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats