{"id":34286,"date":"2025-05-03T01:49:17","date_gmt":"2025-05-03T01:49:17","guid":{"rendered":""},"modified":"2025-05-15T05:36:12","modified_gmt":"2025-05-15T05:36:12","slug":"cve-2024-11917-authentication-bypass-vulnerability-in-jobsearch-wp-job-board-plugin","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2024-11917-authentication-bypass-vulnerability-in-jobsearch-wp-job-board-plugin\/","title":{"rendered":"<strong>CVE-2024-11917: Authentication Bypass Vulnerability in JobSearch WP Job Board Plugin<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>This blog post aims to shed light on a critical vulnerability, CVE-2024-11917, which affects the JobSearch WP Job Board plugin for WordPress. This plugin is widely used for managing job listings on WordPress websites, and hence, such vulnerabilities could potentially impact a significant number of users. The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32843-sql-injection-vulnerability-in-telecontrol-server-basic-leading-to-authorization-bypass-and-data-manipulation\/\"  data-wpil-monitor-id=\"39039\">vulnerability allows unauthenticated attackers to bypass<\/a> the usual authentication process, enabling them to log in as a connected Xing or Google user. This could <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32857-sql-injection-vulnerability-in-telecontrol-server-basic-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"39788\">lead to unauthorized system<\/a> access, potential data leaks, and other malicious activities.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2024-11917<br \/>\nSeverity: High (Score 8.1)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-22636-cross-site-scripting-vulnerability-in-vr-frases-leads-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"40191\">Potential system<\/a> compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-2245716569\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>JobSearch WP <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3918-privilege-escalation-vulnerability-in-job-listings-plugin-for-wordpress\/\"  data-wpil-monitor-id=\"42964\">Job Board Plugin<\/a> | Up to 2.8.8<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The vulnerability lies in the &#8216;jobsearch_xing_response_data_callback&#8217;, &#8216;set_access_tokes&#8217;, and &#8216;google_callback&#8217; functions of the plugin. Due to an improper configuration, it is possible for unauthenticated attackers to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-44752-authentication-bypass-vulnerability-in-student-study-center-desk-management-system\/\"  data-wpil-monitor-id=\"40340\">bypass the regular authentication<\/a> process. They can log in as the first connected Xing user, or any connected Xing user if the Xing id is known. Also, if the Google user has been logged in for thirty days without logging out, the attackers can log in as the first connected Google user.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-2281853778\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>In a hypothetical scenario, an attacker might exploit this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32432-remote-code-execution-vulnerability-in-craft-cms\/\"  data-wpil-monitor-id=\"40506\">vulnerability by sending a specially crafted<\/a> HTTP request like the one below:<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/wp-login.php HTTP\/1.1\nHost: target.example.com\nContent-Type: application\/x-www-form-urlencoded\nusername=first_connected_xing_user&amp;password=&amp;rememberme=forever&amp;wp-submit=Log+In<\/code><\/pre>\n<p>In the above example, `first_connected_xing_user` is the username of the first connected Xing user. Since the plugin doesn&#8217;t properly validate the credentials, it allows the attacker to log in without any password.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>To mitigate this vulnerability, users are advised to apply the vendor patch as soon as possible. The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-7224-openvpn-connect-vulnerability-in-macos-versions-3-0-to-3-4-6\/\"  data-wpil-monitor-id=\"41198\">vulnerability was partially patched in version<\/a> 2.8.4. As a temporary measure, users can also use a Web Application Firewall (WAF) or Intrusion Detection System (IDS) to monitor and block suspicious activities. However, these measures can only provide temporary relief and may not entirely prevent potential exploits. Hence, applying the vendor patch is the most recommended solution.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview This blog post aims to shed light on a critical vulnerability, CVE-2024-11917, which affects the JobSearch WP Job Board plugin for WordPress. This plugin is widely used for managing job listings on WordPress websites, and hence, such vulnerabilities could potentially impact a significant number of users. The vulnerability allows unauthenticated attackers to bypass the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[91],"product":[],"attack_vector":[75],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-34286","post","type-post","status-publish","format-standard","hentry","category-uncategorized","vendor-google","attack_vector-authentication-bypass"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/34286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=34286"}],"version-history":[{"count":7,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/34286\/revisions"}],"predecessor-version":[{"id":38294,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/34286\/revisions\/38294"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=34286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=34286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=34286"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=34286"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=34286"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=34286"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=34286"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=34286"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=34286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}