Cyber Posture

CVE-2024-11284

Critical

Published: 14 March 2025

Published
14 March 2025
Modified
08 July 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 30.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.

Security Summary

CVE-2024-11284 is a privilege escalation vulnerability via account takeover in the WP JobHunt plugin for WordPress, affecting all versions up to and including 6.9. The issue arises because the plugin does not properly validate a user's identity prior to updating their password through the account_settings_save_callback() function, allowing unauthorized password changes. Published on 2025-03-14, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is linked to CWE-639 (Authorization Bypass Through User-Controlled Key).

Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction or privileges required. By targeting the flawed callback function, they can reset the passwords of arbitrary users, including administrators, enabling full account takeover and potential complete compromise of the affected WordPress site.

Advisories provide further details on the issue, including the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/8afe386e-1e4f-4668-8309-6d47dedb008a?source=cve and the plugin's ThemeForest page at https://themeforest.net/item/jobcareer-job-board-responsive-wordpress-theme/14221636.

Details

CWE(s)
CWE-639

Affected Products

chimpgroup
jobcareer
≤ 7.1

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

Vulnerability in public-facing WordPress plugin enables remote unauthenticated exploitation for initial access (T1190), direct privilege escalation via account takeover (T1068), and abuse of valid accounts (T1078).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References