Description
The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.
Published: 2025-12-20
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via missing authorization
Action: Patch
AI Analysis

Impact

Stored Cross‑Site Scripting via missing authorization is possible in the WP JobHunt plugin for WordPress when a candidate or higher user invokes a status update without an authorization check. The attacker can embed arbitrary JavaScript into the status field of a job application, which will execute whenever a user views that application. This can result in session hijacking, defacement, or theft of sensitive data, compromising confidentiality and integrity. The weakness is classified as a missing authorization flaw (CWE‑862).

Affected Systems

Affected is the WP JobHunt plugin for WordPress, also used by the JobCareer theme. All versions up to and including 7.7 contain the flaw. Any installation within those version ranges is vulnerable and can be exploited by users with Candidate‑level or higher permissions.

Risk and Exploitability

The CVSS score is 7.6, indicating a high severity. The EPSS score is below 1%, suggesting a low likelihood of exploitation in the wild. It is not listed in the CISA KEV catalog. Attackers require an authenticated account with at least Candidate privilege, limiting the threat surface to registered site users. In such environments, the missing authorization allows a malicious candidate to inject XSS payloads into job application status data, achieving client‑side code execution.

Generated by OpenCVE AI on April 20, 2026 at 18:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WP JobHunt plugin to version 7.8 or later, which includes a capability check for status updates.
  • If an upgrade is not possible, temporarily revoke Candidate access to application status functionality or implement granular role permissions to block status updates.
  • Apply server‑side sanitization or escape the status parameter before storing or displaying it, or use a WordPress security plugin that blocks malicious input or XSS payloads.

Generated by OpenCVE AI on April 20, 2026 at 18:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 22 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 21 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wp-jobhunt Project
Wp-jobhunt Project wp-jobhunt
Vendors & Products Wordpress
Wordpress wordpress
Wp-jobhunt Project
Wp-jobhunt Project wp-jobhunt

Sat, 20 Dec 2025 14:00:00 +0000

Type Values Removed Values Added
Description The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.
Title WP JobHunt <= 7.7 - Missing Authorization to Authenticated (Candidate+) Stored Cross-Site Scripting via 'status'
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}


Subscriptions

Wordpress Wordpress
Wp-jobhunt Project Wp-jobhunt
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:15:28.433Z

Reserved: 2025-07-17T23:41:00.886Z

Link: CVE-2025-7782

cve-icon Vulnrichment

Updated: 2025-12-22T15:56:46.507Z

cve-icon NVD

Status : Deferred

Published: 2025-12-20T14:16:03.770

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-7782

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T19:00:10Z

Weaknesses