Impact
A missing authorization check in the WP Job Portal WordPress plugin up to version 2.3.2 allows an attacker to manipulate identifiers in URLs or form data and access or modify job postings, applications, or other protected resources belonging to other users, leading to unauthorized disclosure and potential data tampering.
Affected Systems
WordPress WP Job Portal plugin (wpjobportal:WP Job Portal) version 2.3.2 and earlier are affected; any deployment using these versions is vulnerable.
Risk and Exploitability
The CVSS score of 5.3 reflects moderate risk, while the EPSS score of <1% indicates low exploitation probability under current conditions. The vulnerability is not listed in the CISA KEV catalog. Likely exploitation requires a user to be authenticated within the WordPress site and manipulate numeric or GUID identifiers in HTTP requests; attackers can target publicly viewable or otherwise restricted content by guessing or iterating over resource IDs.
OpenCVE Enrichment
EUVD