Cyber Posture

CVE-2024-11285

Critical

Published: 14 March 2025

Published
14 March 2025
Modified
08 July 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 45.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-11285 is a critical-severity Authorization Bypass Through User-Controlled Key (CWE-639) vulnerability in Chimpgroup Jobcareer. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 45.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations before allowing updates to user account details like email addresses, directly preventing unauthorized modifications via the account_settings_callback() function.

prevent

Implements least privilege to restrict unauthenticated attackers from performing privileged actions such as changing administrator email addresses, mitigating privilege escalation.

prevent

Manages account modifications with validation and approval processes to ensure only authorized changes to user details like email, reducing risks of account takeover.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1098 Account Manipulation Persistence
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

The vulnerability enables remote exploitation of a public-facing WordPress application (T1190), direct unauthorized manipulation of user account details like email addresses (T1098), and subsequent takeover of valid accounts including administrators (T1078).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The WP JobHunt plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 7.1. This is due to the plugin not properly validating a user's identity prior to updating their details like…

more

email via the account_settings_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.

Deeper analysisAI

CVE-2024-11285 is a critical privilege escalation vulnerability affecting the WP JobHunt plugin for WordPress in all versions up to and including 7.1. The flaw stems from the plugin's account_settings_callback() function failing to properly validate a user's identity before allowing updates to account details, such as email addresses. This authorization bypass, mapped to CWE-639, enables unauthorized modifications without authentication, earning a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By targeting the account settings endpoint, they can arbitrarily change any user's email address, including those of administrators, then leverage the altered email to initiate a password reset process. Successful exploitation results in full account takeover, granting attackers high confidentiality, integrity, and availability impacts, such as unauthorized access to privileged accounts and potential further compromise of the WordPress site.

Advisories from sources like Wordfence provide detailed threat intelligence on the vulnerability, while the plugin's listing on ThemeForest offers context on the affected JobCareer theme integration. Practitioners should consult these references for patch availability, as the description indicates no built-in mitigations in vulnerable versions, and updating to a fixed release beyond 7.1 is implied as the primary remediation.

Details

CWE(s)

Affected Products

chimpgroup
jobcareer
≤ 7.1

CVEs Like This One

CVE-2024-11284Same product: Chimpgroup Jobcareer
CVE-2024-11283Same product: Chimpgroup Jobcareer
CVE-2024-11286Same product: Chimpgroup Jobcareer
CVE-2024-12810Same product: Chimpgroup Jobcareer
CVE-2026-5652Shared CWE-639
CVE-2026-25197Shared CWE-639
CVE-2025-14998Shared CWE-639
CVE-2025-9114Shared CWE-639
CVE-2025-10742Shared CWE-639
CVE-2025-15521Shared CWE-639

References