Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14293: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpjobportal WP Job Portal – AI-Powered Recruitment System for Company or Job Board website

0
Medium
VulnerabilityCVE-2025-14293cvecve-2025-14293cwe-22
Published: Thu Dec 11 2025 (12/11/2025, 20:22:09 UTC)
Source: CVE Database V5
Vendor/Project: wpjobportal
Product: WP Job Portal – AI-Powered Recruitment System for Company or Job Board website

Description

The WP Job Portal plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.4.0 via the 'downloadCustomUploadedFile' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

AI-Powered Analysis

AILast updated: 12/11/2025, 20:56:24 UTC

Technical Analysis

CVE-2025-14293 is a path traversal vulnerability classified under CWE-22 found in the WP Job Portal plugin for WordPress, an AI-powered recruitment system used by companies and job boards. The vulnerability exists in the 'downloadCustomUploadedFile' function, which fails to properly restrict pathname inputs, allowing authenticated users with as low as Subscriber-level privileges to read arbitrary files on the server. This arbitrary file read capability enables attackers to access sensitive server files, such as configuration files, credentials, or other private data, potentially leading to information disclosure. The vulnerability requires authentication but no additional user interaction, and the attack vector is network-based with low complexity. The CVSS v3.1 score is 6.5, reflecting a medium severity primarily due to the high confidentiality impact but no impact on integrity or availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be considered a significant risk for affected installations. Organizations using this plugin should assess their exposure and implement compensating controls until a patch is released.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive data exposure from recruitment or job board websites using the WP Job Portal plugin. Confidential information such as internal configuration files, user data, or credentials could be accessed by low-privileged authenticated users, potentially leading to further compromise if attackers leverage disclosed information. This can damage organizational reputation, violate data protection regulations like GDPR, and result in legal and financial consequences. The impact is particularly critical for organizations handling large volumes of personal data or operating in regulated sectors such as finance, healthcare, or government. Since the vulnerability does not affect integrity or availability, the primary concern is confidentiality breach. The ease of exploitation by authenticated users increases risk, especially in environments with many registered users or weak access controls.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately restrict access to the WP Job Portal plugin functions to trusted users only, minimizing the number of accounts with Subscriber-level or higher privileges. Implement strict user role management and audit existing accounts for unnecessary privileges. Monitor web server and application logs for unusual file access patterns related to the 'downloadCustomUploadedFile' function. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting this plugin. Until an official patch is released, consider disabling the plugin or replacing it with alternative recruitment solutions that do not have this vulnerability. Additionally, ensure that sensitive files on the server are stored outside the web root or have appropriate filesystem permissions to limit exposure. Regularly update WordPress core and plugins to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-08T19:46:21.034Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b2c5f22246175c6996d20

Added to database: 12/11/2025, 8:41:03 PM

Last enriched: 12/11/2025, 8:56:24 PM

Last updated: 12/11/2025, 11:47:15 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats