CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.
AI Analysis
Technical Summary
CVE-2025-7782 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP JobHunt plugin for WordPress, which is commonly used alongside the JobCareer theme. The vulnerability exists because the 'cs_update_application_status_callback' function does not perform adequate capability checks before allowing status updates on job applications. This flaw permits any authenticated user with Candidate-level access or higher to modify the 'status' parameter of job applications belonging to any user, bypassing intended authorization controls. The vulnerability enables injection of cross-site scripting (XSS) payloads into the status field, which can be used to execute malicious scripts in the context of the victim's browser. The CVSS v3.1 score is 7.6 (high), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality (high), integrity (low), and availability (low). Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the widespread use of WordPress and the WP JobHunt plugin in recruitment websites. Attackers could leverage this to manipulate application statuses, inject malicious scripts, and potentially pivot to further attacks within the affected environment.
Potential Impact
For European organizations, especially those operating recruitment or HR platforms using WordPress with the WP JobHunt plugin, this vulnerability could lead to unauthorized data manipulation, undermining the integrity of job application records. The XSS injection capability could facilitate session hijacking, credential theft, or delivery of malware to users interacting with the affected application. Confidentiality is at high risk as attackers can manipulate data visible to other users or administrators. Availability impact is low but possible if attackers disrupt application workflows or cause application errors. The breach of trust in recruitment platforms could damage organizational reputation and lead to regulatory scrutiny under GDPR if personal data is compromised. Given the network-exploitable nature and low complexity, attackers with basic authenticated access could exploit this vulnerability, increasing the threat surface for European organizations reliant on these platforms.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the WP JobHunt plugin and verify the version in use. Until an official patch is released, restrict user roles to the minimum necessary privileges, especially limiting Candidate-level users from accessing functions that modify application statuses. Implement web application firewalls (WAFs) with custom rules to detect and block anomalous requests targeting the 'cs_update_application_status_callback' endpoint, particularly those attempting to inject scripts into the 'status' parameter. Conduct thorough input validation and sanitization on all user-supplied data fields within the application. Monitor logs for unusual activity related to job application status updates. Educate administrators and developers about the vulnerability to ensure rapid patch deployment once available. Additionally, consider isolating the recruitment platform from other critical systems to limit lateral movement in case of compromise.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
Description
The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.
AI-Powered Analysis
Technical Analysis
CVE-2025-7782 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP JobHunt plugin for WordPress, which is commonly used alongside the JobCareer theme. The vulnerability exists because the 'cs_update_application_status_callback' function does not perform adequate capability checks before allowing status updates on job applications. This flaw permits any authenticated user with Candidate-level access or higher to modify the 'status' parameter of job applications belonging to any user, bypassing intended authorization controls. The vulnerability enables injection of cross-site scripting (XSS) payloads into the status field, which can be used to execute malicious scripts in the context of the victim's browser. The CVSS v3.1 score is 7.6 (high), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality (high), integrity (low), and availability (low). Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the widespread use of WordPress and the WP JobHunt plugin in recruitment websites. Attackers could leverage this to manipulate application statuses, inject malicious scripts, and potentially pivot to further attacks within the affected environment.
Potential Impact
For European organizations, especially those operating recruitment or HR platforms using WordPress with the WP JobHunt plugin, this vulnerability could lead to unauthorized data manipulation, undermining the integrity of job application records. The XSS injection capability could facilitate session hijacking, credential theft, or delivery of malware to users interacting with the affected application. Confidentiality is at high risk as attackers can manipulate data visible to other users or administrators. Availability impact is low but possible if attackers disrupt application workflows or cause application errors. The breach of trust in recruitment platforms could damage organizational reputation and lead to regulatory scrutiny under GDPR if personal data is compromised. Given the network-exploitable nature and low complexity, attackers with basic authenticated access could exploit this vulnerability, increasing the threat surface for European organizations reliant on these platforms.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the WP JobHunt plugin and verify the version in use. Until an official patch is released, restrict user roles to the minimum necessary privileges, especially limiting Candidate-level users from accessing functions that modify application statuses. Implement web application firewalls (WAFs) with custom rules to detect and block anomalous requests targeting the 'cs_update_application_status_callback' endpoint, particularly those attempting to inject scripts into the 'status' parameter. Conduct thorough input validation and sanitization on all user-supplied data fields within the application. Monitor logs for unusual activity related to job application status updates. Educate administrators and developers about the vulnerability to ensure rapid patch deployment once available. Additionally, consider isolating the recruitment platform from other critical systems to limit lateral movement in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-17T23:41:00.886Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6946aa3f987e301cd6415949
Added to database: 12/20/2025, 1:53:03 PM
Last enriched: 12/20/2025, 2:07:58 PM
Last updated: 12/20/2025, 6:36:13 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalCVE-2025-12820: CWE-862 Missing Authorization in Pure WC Variation Swatches
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.