CVE-2025-7782
Cross-Site Scripting in WP JobHunt Plugin via Status Parameter
Publication date: 2025-12-20
Last updated on: 2025-12-20
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | wp_jobhunt | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the WP JobHunt plugin for WordPress, specifically in the 'cs_update_application_status_callback' function. Due to a missing capability check, authenticated users with Candidate-level access or higher can modify data they shouldn't be able to. They can inject cross-site scripting (XSS) code into the 'status' parameter of job applications for any user, potentially compromising the site or other users.
How can this vulnerability impact me? :
The vulnerability allows attackers with Candidate-level access to inject malicious scripts into job application statuses. This can lead to cross-site scripting attacks, which may result in unauthorized actions, data theft, session hijacking, or defacement of the website. It compromises the integrity and security of user data and the website.