- Description
- The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to SQL Injection via the 'ff' parameter of the getFieldsForVisibleCombobox() function in all versions up to, and including, 2.2.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
- Source
- security@wordfence.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 4.9
- Impact score
- 3.6
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
- security@wordfence.com
- CWE-89
- Hype score
- Not currently trending
🚨 CVE-2024-11714 (Published: 2024-12-14) - A high-severity vulnerability in the wp-job-portal plugin affects versions prior to 2.2.3. Users are urged to update to the latest version to mitigate risks. For details, check the changeset: https://t.co/8tdLJcV56R #WordPress #Security
@transilienceai
18 Dec 2024
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-11714 SQL Injection Vulnerability in WP Job Portal Plugin v2.2.2 The WP Job Portal plugin for WordPress has an SQL Injection vulnerability. This issue is in the 'ff' parameter of the getFieldsForVisibleC... https://t.co/cT1v69hs0r
@VulmonFeeds
14 Dec 2024
78 Impressions
1 Retweet
1 Like
1 Bookmark
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wpjobportal:wp_job_portal:*:*:*:*:*:wordpress:*:*",
"vulnerable": true,
"matchCriteriaId": "990D05B3-6114-4654-9399-4A620CAED94A",
"versionEndExcluding": "2.2.3"
}
],
"operator": "OR"
}
]
}
]