- Description
- The InWave Jobs plugin for WordPress is vulnerable to privilege escalation via password reset in all versions up to, and including, 3.5.1. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
- Source
- security@wordfence.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- Hype score
- Not currently trending
CVE-2025-1315 The InWave Jobs plugin for WordPress is vulnerable to privilege escalation via password reset in all versions up to, and including, 3.5.1. This is due to the plugin not… https://t.co/GHziTPJtP0
@CVEnew
8 Mar 2025
154 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-1315 ⚠️🔴 CRITICAL (9.8) 🏢 sfwebservice - InWave Jobs 🏗️ * 🔗 https://t.co/y5UW4RL2pY 🔗 https://t.co/xKxIWjtbdu #CyberCron #VulnAlert #InfoSec https://t.co/HbC5RavErJ
@cybercronai
7 Mar 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
�� CVE-2025-1315 - WordPress - CRITICAL 🚨 🗓️ Date published 2025-03-07 09:15:16 UTC #WordPress #CyberSecurity #InfoSec #Vulnerability #TechNews https://t.co/7jEatZA1Nm
@vulns_space
7 Mar 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-1315: CRITICAL] InWave Jobs plugin for WordPress up to version 3.5.1 is vulnerable to privilege escalation through password reset. Attackers can change passwords of any user, including admins, due to lac...#cybersecurity,#vulnerability https://t.co/scdvsBRm1H https://t.
@CveFindCom
7 Mar 2025
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sfwebservice:injob:*:*:*:*:*:wordpress:*:*",
"vulnerable": true,
"matchCriteriaId": "D0BEC03F-2B50-4A98-A548-F79ADE5BA549",
"versionEndIncluding": "3.5.1"
}
],
"operator": "OR"
}
]
}
]