Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in eyecix JobSearch wp-jobsearch allows Reflected XSS.This issue affects JobSearch: from n/a through <= 3.2.0.
Published: 2026-03-25
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability arises from improper neutralization of input during web page generation. As a result, a malicious actor can embed and return arbitrary JavaScript code that is executed in the victim’s browser. The weakness is a classic cross‑site scripting flaw (CWE‑79), enabling actions such as cookie theft, session hijacking, defacement or redirection to malicious sites. The plugin fails to escape or validate user‑supplied data that is reflected back to the page, creating a direct path for script injection.

Affected Systems

WordPress sites that have the eyecix JobSearch plugin installed in any version up to and including 3.2.0 are vulnerable. This includes any deployment that has not yet upgraded to the newer releases that contain the fix. Sites relying on older versions of the plugin remain at risk.

Risk and Exploitability

Based on the description, it is inferred that the attack can be performed by delivering a specially crafted URL or form input that is reflected by the plugin’s output. The EPSS score (< 1%) indicates a very low, but non‑zero probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. The flaw is known to be high risk due to its ease of exploitation and broad impact. Because the vulnerability is client‑side, an attacker only needs to entice a user to visit the carefully constructed link; authentication or elevated privileges are not required.

Generated by OpenCVE AI on April 29, 2026 at 12:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the eyecix JobSearch WordPress plugin to version 3.2.1 or newer that contains an input sanitization fix.
  • Configure a web application firewall or content security policy to filter or block suspicious input patterns that could lead to XSS.
  • If the plugin is not essential, disable or uninstall it to eliminate the vulnerable code path.

Generated by OpenCVE AI on April 29, 2026 at 12:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Eyecix
Eyecix jobsearch
Wordpress
Wordpress wordpress
Vendors & Products Eyecix
Eyecix jobsearch
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in eyecix JobSearch wp-jobsearch allows Reflected XSS.This issue affects JobSearch: from n/a through <= 3.2.0.
Title WordPress JobSearch plugin <= 3.2.0 - Reflected Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Eyecix Jobsearch
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:52:00.791Z

Reserved: 2026-03-12T11:12:00.510Z

Link: CVE-2026-32493

cve-icon Vulnrichment

Updated: 2026-03-25T18:49:11.365Z

cve-icon NVD

Status : Deferred

Published: 2026-03-25T17:17:00.970

Modified: 2026-04-29T10:17:14.817

Link: CVE-2026-32493

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T13:00:06Z

Weaknesses