Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt

0
High
VulnerabilityCVE-2025-7782cvecve-2025-7782cwe-862
Published: Sat Dec 20 2025 (12/20/2025, 13:47:43 UTC)
Source: CVE Database V5
Product: WP JobHunt

Description

The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.

AI-Powered Analysis

AILast updated: 12/20/2025, 14:07:58 UTC

Technical Analysis

CVE-2025-7782 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP JobHunt plugin for WordPress, which is commonly used alongside the JobCareer theme. The vulnerability exists because the 'cs_update_application_status_callback' function does not perform adequate capability checks before allowing status updates on job applications. This flaw permits any authenticated user with Candidate-level access or higher to modify the 'status' parameter of job applications belonging to any user, bypassing intended authorization controls. The vulnerability enables injection of cross-site scripting (XSS) payloads into the status field, which can be used to execute malicious scripts in the context of the victim's browser. The CVSS v3.1 score is 7.6 (high), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality (high), integrity (low), and availability (low). Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the widespread use of WordPress and the WP JobHunt plugin in recruitment websites. Attackers could leverage this to manipulate application statuses, inject malicious scripts, and potentially pivot to further attacks within the affected environment.

Potential Impact

For European organizations, especially those operating recruitment or HR platforms using WordPress with the WP JobHunt plugin, this vulnerability could lead to unauthorized data manipulation, undermining the integrity of job application records. The XSS injection capability could facilitate session hijacking, credential theft, or delivery of malware to users interacting with the affected application. Confidentiality is at high risk as attackers can manipulate data visible to other users or administrators. Availability impact is low but possible if attackers disrupt application workflows or cause application errors. The breach of trust in recruitment platforms could damage organizational reputation and lead to regulatory scrutiny under GDPR if personal data is compromised. Given the network-exploitable nature and low complexity, attackers with basic authenticated access could exploit this vulnerability, increasing the threat surface for European organizations reliant on these platforms.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the WP JobHunt plugin and verify the version in use. Until an official patch is released, restrict user roles to the minimum necessary privileges, especially limiting Candidate-level users from accessing functions that modify application statuses. Implement web application firewalls (WAFs) with custom rules to detect and block anomalous requests targeting the 'cs_update_application_status_callback' endpoint, particularly those attempting to inject scripts into the 'status' parameter. Conduct thorough input validation and sanitization on all user-supplied data fields within the application. Monitor logs for unusual activity related to job application status updates. Educate administrators and developers about the vulnerability to ensure rapid patch deployment once available. Additionally, consider isolating the recruitment platform from other critical systems to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-07-17T23:41:00.886Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6946aa3f987e301cd6415949

Added to database: 12/20/2025, 1:53:03 PM

Last enriched: 12/20/2025, 2:07:58 PM

Last updated: 12/20/2025, 6:36:13 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats