Description
The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to Stored Cross-Site Scripting via the ‘cs_job_title’ parameter in all versions up to, and including, 7.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-10-10
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Update
AI Analysis

Impact

The WP JobHunt plugin allows an authenticated user with Candidate-level or higher permissions to place arbitrary scripts into the job title field, which is subsequently displayed without proper sanitization or escaping. This stored cross‑site scripting flaw permits the execution of user‑controlled code in the browsers of anyone who views the affected job listing, potentially exposing credentials, session data, or other sensitive information to the attacker.

Affected Systems

All installations of the WP JobHunt plugin with a version number of 7.6 or lower, including deployments of the JobCareer theme that embed this plugin.

Risk and Exploitability

The vulnerability carries a CVSS score of 6.4, indicating a moderate severity, and has an EPSS score of less than 1 %, suggesting that exploitation is currently uncommon. It is not present in the CISA KEV catalog. Exploitation requires the attacker to be authenticated as a Candidate or higher, but once a script is injected it will run for all visitors to the page, giving an attacker the ability to steal session cookies, perform phishing, or compromise the site. The modest EPSS score does not eliminate risk, especially for sites that rely on the plugin and have broad Candidate access.

Generated by OpenCVE AI on April 22, 2026 at 16:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WP JobHunt plugin to a version newer than 7.6, which resolves the input sanitization issue.
  • Limit the Candidate role’s capabilities so that users with only Candidate access cannot edit job titles or other plugin fields that accept the cs_job_title parameter.
  • Apply a content‑security‑policy or use an input‑sanitization plugin to strip or encode disallowed tags from the cs_job_title field as a temporary workaround until the plugin is updated.

Generated by OpenCVE AI on April 22, 2026 at 16:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wordpress wordpress Mu
Wp-jobhunt Project
Wp-jobhunt Project wp-jobhunt
Vendors & Products Wordpress
Wordpress wordpress
Wordpress wordpress Mu
Wp-jobhunt Project
Wp-jobhunt Project wp-jobhunt

Fri, 10 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Oct 2025 11:30:00 +0000

Type Values Removed Values Added
Description The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to Stored Cross-Site Scripting via the ‘cs_job_title’ parameter in all versions up to, and including, 7.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title WP JobHunt <= 7.6 - Authenticated (Candidate+) Stored Cross-Site Scripting via ‘cs_job_title’
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress Wordpress Mu
Wp-jobhunt Project Wp-jobhunt
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:35:25.241Z

Reserved: 2025-07-17T23:20:30.661Z

Link: CVE-2025-7781

cve-icon Vulnrichment

Updated: 2025-10-10T12:24:24.975Z

cve-icon NVD

Status : Deferred

Published: 2025-10-10T12:15:38.127

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-7781

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T17:00:12Z

Weaknesses