Overview
The WP JobHunt plugin for WordPress, a popular application used by millions for job board functionality, is currently facing a significant cybersecurity threat. The plugin has been identified with a vulnerability that allows users with minimal privileges to delete the accounts of other users, potentially leading to major data loss or even a system compromise. This vulnerability, identified as CVE-2025-6585, affects all versions up to and including 7.2 of the WP JobHunt plugin. Given the widespread use of WordPress and this plugin, this vulnerability poses a serious risk to website owners, businesses, and users alike.
Vulnerability Summary
CVE ID: CVE-2025-6585
Severity: High (8.1 CVSS Score)
Attack Vector: Network
Privileges Required: Low (Subscriber-level access)
User Interaction: Required
Impact: Potential system compromise or data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
WP JobHunt Plugin for WordPress | Up to and including 7.2
How the Exploit Works
The exploit takes advantage of a flaw in the `cs_remove_profile_callback()` function of the WP JobHunt plugin. Specifically, the function fails to validate a user-controlled key properly. This oversight enables an authenticated attacker, even with just Subscriber-level access, to delete accounts of other users, including admins. The attacker could potentially craft a malicious payload, send it to the vulnerable server, and delete other users’ accounts, thereby gaining unauthorized access or causing significant disruption.
Conceptual Example Code
The following pseudocode illustrates what an exploit might look like:
POST /wp-jobhunt/delete-profile HTTP/1.1
Host: target.example.com
Content-Type: application/json
{
"user_id": "[Target User ID]",
"action": "delete"
}
In this example, the attacker sends a POST request to the vulnerable endpoint with a JSON payload containing the user_id of the targeted account and an action set to “delete”. Since the `cs_remove_profile_callback()` function does not properly validate the user_id, the server processes the request, leading to the deletion of the targeted account.
Recommendations for Mitigation
The vendor has released a patch to fix this vulnerability, and it is highly recommended to apply this patch immediately. If this is not possible, a temporary mitigation can be implemented by using a Web Application Firewall (WAF) or Intrusion Detection System (IDS). These can help block or alert on suspicious activities to reduce the risk of exploitation. Additionally, regular audits of user activity and strong password policies can help prevent unauthorized access.