Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13425: CWE-639 Authorization Bypass Through User-Controlled Key in wpjobportal WP Job Portal – A Complete Recruitment System for Company or Job Board website

0
Medium
VulnerabilityCVE-2024-13425cvecve-2024-13425cwe-639
Published: Sat Feb 01 2025 (02/01/2025, 07:21:38 UTC)
Source: CVE Database V5
Vendor/Project: wpjobportal
Product: WP Job Portal – A Complete Recruitment System for Company or Job Board website

Description

CVE-2024-13425 is an authorization bypass vulnerability in the WP Job Portal WordPress plugin, affecting all versions up to 2. 2. 6. The flaw exists due to missing validation on a user-controlled key in the enforcedelete() function, allowing authenticated users with Employer-level access or higher to delete companies owned by other users. This vulnerability does not impact confidentiality or availability but can lead to integrity loss by unauthorized deletion of data. Exploitation requires authentication but no user interaction, and the attack can be performed remotely. The CVSS score is 4. 3 (medium severity). No known exploits are currently reported in the wild. Organizations using this plugin for recruitment or job board websites should prioritize patching or applying access control restrictions to mitigate risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:14:46 UTC

Technical Analysis

CVE-2024-13425 is a vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the WP Job Portal plugin for WordPress, a widely used recruitment system plugin for company or job board websites. The vulnerability arises from the enforcedelete() function, which fails to properly validate a user-controlled key parameter. This lack of validation allows authenticated users with Employer-level privileges or higher to delete company records that belong to other users, bypassing intended authorization controls. The vulnerability affects all versions up to and including 2.2.6. The attack vector is network-based (remote), requiring low attack complexity and only privileges equivalent to an Employer role, which is a common user level in this plugin. No user interaction is required for exploitation. The vulnerability impacts data integrity by enabling unauthorized deletion of company data but does not affect confidentiality or availability. The CVSS v3.1 base score is 4.3, reflecting a medium severity level due to the limited scope and required privileges. No public exploits or active exploitation in the wild have been reported as of the publication date. The vulnerability highlights the importance of proper access control and input validation in multi-tenant web applications, especially those managing sensitive business data such as recruitment platforms.

Potential Impact

The primary impact of this vulnerability is the unauthorized deletion of company data within the WP Job Portal plugin. For organizations relying on this plugin to manage recruitment or job board services, this can result in data integrity loss, disruption of business operations, and potential reputational damage. Although the vulnerability does not expose confidential information or cause denial of service, the ability for an authenticated user to delete other users' companies could lead to significant operational disruption, loss of critical business data, and administrative overhead to restore or recover deleted records. In multi-tenant environments, this could also cause conflicts between users and undermine trust in the platform. The requirement for authenticated Employer-level access limits the attack surface but does not eliminate risk, especially in environments with many users or where user privileges are not tightly controlled. Organizations worldwide using this plugin are at risk, particularly those with large user bases or high-value recruitment data.

Mitigation Recommendations

To mitigate CVE-2024-13425, organizations should immediately upgrade the WP Job Portal plugin to a version where this vulnerability is patched once available. In the absence of an official patch, administrators should implement strict access control policies to limit Employer-level privileges only to trusted users. Additionally, custom code or web application firewalls (WAFs) can be configured to monitor and block suspicious requests targeting the enforcedelete() function or containing unexpected key parameters. Regular auditing of user permissions and activity logs can help detect unauthorized deletion attempts. Backup and recovery procedures should be reviewed and tested to ensure rapid restoration of deleted data. Developers maintaining custom integrations should review the plugin’s authorization logic and add server-side validation to confirm that users can only delete companies they own. Finally, monitoring for unusual deletion patterns and alerting administrators can help mitigate damage from exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-15T19:23:55.733Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e56b7ef31ef0b59e7f5

Added to database: 2/25/2026, 9:49:10 PM

Last enriched: 2/26/2026, 1:14:46 AM

Last updated: 2/26/2026, 6:18:39 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats