We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-13372

WP Job Portal <= 2.2.6 - Insecure Direct Object Reference to Unauthenticated Arbitrary Resume Download



Description

The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.6 via the getresumefiledownloadbyid() and getallresumefiles() functions due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to download users resumes without the appropriate authorization to do so.

Reserved 2025-01-13 | Published 2025-02-01 | Updated 2025-02-03 | Assigner Wordfence


MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

*
affected

Timeline

2025-01-31:Disclosed

Credits

Tran Van Nhan finder

References

www.wordfence.com/...-db58-4d13-8cb3-c4d62a2553fb?source=cve

plugins.trac.wordpress.org/...ules%2Fresume%2Fcontroller.php

cve.org (CVE-2024-13372)

nvd.nist.gov (CVE-2024-13372)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-13372

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.