Broken Access Control vulnerability
-
That was reported in 2.4.0 and was fixed in 2.4.1. I’m not sure why it shows a problem in 2.4.1. Maybe because we didn’t explicitely mention it but we told the original reporter it was fixed.
I’ve updated the readme.txt in 2.4.1 now. Hopefully they fix their report.
Edit: I think, but it’s a different reporter from the 2.4.0 one. We’ll fix it ASAP if there’s anything to fix.
-
This reply was modified 3 weeks, 5 days ago by
Donncha O Caoimh (a11n).
-
This reply was modified 3 weeks, 5 days ago by
Donncha O Caoimh (a11n).
@donncha Wordfence and Solid Security still cite it as a current issue:
- The Plugin “WP Job Manager” has a security vulnerability.Type: Plugin Vulnerable
- Issue Found April 18, 2026 6:07 amCritical
- IgnoreDetails
- Plugin Name: WP Job Manager
- Current Plugin Version: 2.4.1
- Details: To protect your site from this vulnerability, the safest option is to deactivate and completely remove “WP Job Manager” until a patched version is available. Get more information.(opens in new tab)
- Repository URL: https://wordpress.org/plugins/wp-job-manager(opens in new tab)
- Vulnerability Information: https://www.wordfence.com/threat-intel/vulnerabilities/id/3099875e-ed6e-4d59-9da2-48fb389112ef?source=plugin(opens in new tab)
- Vulnerability Severity: 5.3/10.0
@pineapplepalm We’re looking into it. Should have a fix out today.
@donncha thanks! We appreciate your team’s efforts.
May I also take this time to tell you there are many other issues (which can lead to vulnerabilities) which are shown in the Plugin Checker when run on this plugin. I have the upgraded Jobs Manager suite too, and in each of those plugins there are also many errors and warning which we’re concerned can lead to various exploits. WP Jobs Manager represents one of the most important features of our site, and I’m sure many other users.
All that said, I wondered, if your team would be willing to look into that too? There’s a lot of these, but here’s a few I see from the assessment:
WARNINGPluginCheck.Security.DirectDB.UnescapedDBParameterUnescaped parameter $query used in $wpdb->get_results()\n$query assigned unsafely
ERROR missing_direct_file_access_protectionPHP file should prevent direct access. Add a check like: if ( ! defined( ‘ABSPATH’ ) ) exit;
WARNING WordPress.Security.NonceVerification.MissingProcessing form data without nonce verification.
ERROR missing_direct_file_access_protectionPHP file should prevent direct access. Add a check like: if ( ! defined( ‘ABSPATH’ ) ) exit;
ERROR outdated_tested_upto_headerTested up to: 6.6 < 6.9.
The “Tested up to” value in your plugin is not set to the current version of WordPress.WARNING WordPress.Security.NonceVerification.MissingProcessing form data without nonce verification.
ERROR PluginCheck.CodeAnalysis.Heredoc.NotAllowedUse of heredoc syntax (<<<) is not allowed; use standard strings or inline HTML instead
ERROR plugin_updater_detectedPlugin Updater detected.
These are not permitted in WordPress.org hosted plugins. Detected: site_transient_update_pluginsERROR WordPress.Security.EscapeOutput.UnsafePrintingFunctionAll output should be run through an escaping function (like esc_html_e() or esc_attr_e()), found ‘_e’.
ERROR WordPress.Security.EscapeOutput.OutputNotEscapedAll output should be run through an escaping function
WARNING missing_composer_json_fileThe “/vendor” directory using composer exists, but “composer.json” file is missing.
ERROR badly_named_filesFile and folder names must not contain spaces or special characters.
Thanks for your attention to this. We appreciate your team.
If possible can you assist to allow me to edit one of my comments which has our URL in it. For security reasons, I dont want that exposed on WP.org
I have a massive PR in the works to fix the plugin check issues. I’m of two minds about it. If I submit it, then existing PRs may have conflicts making it harder for other contributors.
Unfortunately I can’t edit any forum posts. There is the “Report this topic for:” form in the sidebar. Explain what you need changed and someone will see it.
@donncha Ahh I see. That PR is a pickle. It might be that other contributors are slow-rolling their fixes (understandably… other projects and all). But, ultimately it might be a case of 2-3 others who are fixing things vs 80k active site admins plus the many hundreds of thousands of end users who are kinda vulnerable atm.
If they don’t have a fairly imminent window to push theirs, so you can get started with fixing your collossal load of issues you may have to bite the bullet and follow through. It’s been a couple of months since the PR but these issues preceded that.
I feel your pain on this – really hoping it can be addressed. I know it’s by no means a flicked switch fix, but maybe some cajoling at this point so their contributions aren’t wasted makes sense?
Standing by hoping for a resolution soon on it. Appreciate your support and openess to share the issues impacting it.
Another sidebar FYI, in the Alerts plugin, you can’t remove the RSS (there doesn’t seem to be a setting for that). Useful since we’re trying to keep our install free of RSS and scraping through as many vectors as possible
Hi @donncha any update to my above last response.
I’d love to get some feedback on that PR if you can help test it, @pineapplepalm. I did a few hours of work on it today, but there are many more plugin check issues to fix too, if you can lend a hand to make it better.
@donncha I could probably test a completed plugin zip with a staged site to see how it behaves, plus a vulnerability code pass, another PCP, and conflict testing with some standard plugins. I won’t be able to test via a fork/PR in GitHub right now due to time constraints.
Working on a platform build atm. Do you feel the current state is stable enough for staging-level testing, or would you prefer to push a bit further before that?
Thanks for re-prioritizing this, it doesn’t go unnoticed.
-
This reply was modified 3 weeks, 5 days ago by
You must be logged in to reply to this topic.