Description
Authentication Bypass Using an Alternate Path or Channel vulnerability in NooTheme Jobica Core jobica-core allows Authentication Abuse.This issue affects Jobica Core: from n/a through <= 1.4.2.
Published: 2026-03-25
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Account Takeover
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an attacker to bypass authentication by using an alternate path or channel within the NooTheme Jobica Core plugin. Once authentication is bypassed, the attacker can gain unauthorized access to administrator accounts, enabling full control over the WordPress site, including the ability to manipulate content, settings, or install additional malware. The weakness is classified as CWE-288, indicating an authentication abuse scenario.

Affected Systems

WordPress installations that utilize the NooTheme Jobica Core plugin version 1.4.2 or any earlier release are affected. Site administrators and developers deploying these versions must be aware that their sites could be compromised if the plugin is not updated.

Risk and Exploitability

With a CVSS score of 9.8, this flaw represents a critical vulnerability, though the EPSS score of less than 1% suggests that exploitation is currently unlikely. The vulnerability is not listed in the CISA KEV catalog, which indicates no publicly known exploits at the time of reporting. Attacks would require identifying the vulnerable endpoint, sending a crafted request to trigger the authentication bypass, and then establishing control over the compromised account. The potential impact ranges from site defacement to complete takeover, affecting both confidentiality and integrity of site data.

Generated by OpenCVE AI on March 26, 2026 at 16:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade NooTheme Jobica Core to the latest available version (greater than 1.4.2).
  • Verify that the new version has been successfully installed and that the authentication mechanism functions correctly.
  • Disable or remove the Jobica Core plugin if an upgrade cannot be performed immediately.
  • Monitor site logs for suspicious authentication attempts or abnormal activity.
  • Apply general WordPress security best practices, such as strong passwords, two‑factor authentication, and regular backups.

Generated by OpenCVE AI on March 26, 2026 at 16:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Nootheme
Nootheme jobica Core
Wordpress
Wordpress wordpress
Vendors & Products Nootheme
Nootheme jobica Core
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Authentication Bypass Using an Alternate Path or Channel vulnerability in NooTheme Jobica Core jobica-core allows Authentication Abuse.This issue affects Jobica Core: from n/a through <= 1.4.2.
Title WordPress Jobica Core plugin <= 1.4.2 - Account Takeover vulnerability
Weaknesses CWE-288
References

Subscriptions

Nootheme Jobica Core
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-23T14:14:10.325Z

Reserved: 2026-02-17T13:23:30.504Z

Link: CVE-2026-27049

cve-icon Vulnrichment

Updated: 2026-03-26T15:12:36.785Z

cve-icon NVD

Status : Deferred

Published: 2026-03-25T17:16:54.260

Modified: 2026-04-24T16:35:20.070

Link: CVE-2026-27049

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:31:29Z

Weaknesses