The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.
History

Sat, 20 Dec 2025 14:00:00 +0000

Type Values Removed Values Added
Description The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.
Title WP JobHunt <= 7.7 - Missing Authorization to Authenticated (Candidate+) Stored Cross-Site Scripting via 'status'
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-12-20T13:47:43.316Z

Updated: 2025-12-20T13:47:43.316Z

Reserved: 2025-07-17T23:41:00.886Z

Link: CVE-2025-7782

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-20T14:16:03.770

Modified: 2025-12-20T14:16:03.770

Link: CVE-2025-7782

cve-icon Redhat

No data.