Skip to main content

CVE-2025-49975: CWE-352 Cross-Site Request Forgery (CSRF) in Hossni Mubarak JobWP

Medium
VulnerabilityCVE-2025-49975cvecve-2025-49975cwe-352
Published: Fri Jun 20 2025 (06/20/2025, 15:04:15 UTC)
Source: CVE Database V5
Vendor/Project: Hossni Mubarak
Product: JobWP

Description

Cross-Site Request Forgery (CSRF) vulnerability in Hossni Mubarak JobWP allows Cross Site Request Forgery. This issue affects JobWP: from n/a through 2.4.0.

AI-Powered Analysis

AILast updated: 06/21/2025, 12:21:31 UTC

Technical Analysis

CVE-2025-49975 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the JobWP plugin developed by Hossni Mubarak, affecting versions up to and including 2.4.0. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting unwanted actions on a web application in which they are currently authenticated. In this case, the vulnerability exists because JobWP does not adequately verify that requests originate from legitimate users or trusted sources, enabling attackers to craft malicious web requests that execute unintended actions on behalf of authenticated users. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The impact is limited to integrity (I:L) with no confidentiality or availability impact. The vulnerability does not require authentication, but the victim must be authenticated to the JobWP plugin to be exploited. There are no known exploits in the wild, and no patches have been published yet. The absence of patch links indicates that users of affected versions remain vulnerable until a fix is released. Since JobWP is a WordPress plugin used for job board functionality, the vulnerability could allow attackers to manipulate job postings, user data, or administrative settings by leveraging authenticated sessions. This could lead to unauthorized content changes, defacement, or manipulation of job listings, potentially damaging the trustworthiness and operational integrity of affected websites.

Potential Impact

For European organizations using the JobWP plugin, this CSRF vulnerability poses a moderate risk primarily to the integrity of their web applications. Organizations operating job boards or recruitment platforms relying on JobWP could face unauthorized modifications to job postings, user profiles, or administrative configurations. This could result in misinformation, reputational damage, or operational disruptions. While confidentiality and availability are not directly impacted, the integrity compromise could indirectly affect user trust and compliance with data accuracy regulations such as GDPR. Attackers exploiting this vulnerability could target HR departments, recruitment agencies, or corporate career portals, potentially leading to misinformation campaigns or manipulation of hiring processes. Given the medium CVSS score and the need for user interaction, the threat is less severe than remote code execution vulnerabilities but still significant in environments where JobWP is widely deployed. The lack of known exploits suggests limited active exploitation currently, but the vulnerability should be addressed proactively to prevent future abuse.

Mitigation Recommendations

1. Immediate mitigation involves implementing CSRF tokens or nonce verification in all state-changing requests within the JobWP plugin to ensure requests originate from legitimate users. 2. Administrators should restrict user roles and permissions to the minimum necessary, reducing the impact of potential CSRF attacks. 3. Employ Content Security Policy (CSP) headers to limit the sources of executable scripts and reduce the risk of malicious request initiation. 4. Monitor web server logs and application behavior for unusual POST requests or unexpected changes in job postings that could indicate exploitation attempts. 5. Until an official patch is released, consider disabling or replacing the JobWP plugin with alternative job board solutions that have robust security controls. 6. Educate users and administrators about phishing and social engineering tactics that could facilitate CSRF attacks, emphasizing cautious behavior when clicking on links or visiting untrusted websites while authenticated. 7. Use web application firewalls (WAFs) configured to detect and block CSRF attack patterns targeting JobWP endpoints. 8. Regularly update WordPress core and all plugins to the latest versions once patches become available to ensure vulnerabilities are remediated promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:07:48.985Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68568e84aded773421b5a9c4

Added to database: 6/21/2025, 10:50:44 AM

Last enriched: 6/21/2025, 12:21:31 PM

Last updated: 8/14/2025, 11:09:05 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats