Hackers exploit critical auth bypass flaw in JobMonster WordPress theme
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。好的,首先我需要通读整篇文章,抓住主要信息。 文章讲的是JobMonster WordPress主题的一个关键漏洞CVE-2025-5397,威胁者利用这个漏洞劫持管理员账户。Wordfence检测到多个攻击尝试。漏洞影响所有版本到4.8.1,主要是认证绕过问题。攻击者需要启用社交登录,并知道管理员的用户名或邮箱。已经修复在4.8.2版本,建议用户升级或禁用社交登录,并启用双因素认证。 还有提到WordPress主题最近成为恶意活动的目标,比如Freeio和Service Finder的主题漏洞。最后强调定期更新插件和主题的重要性。 现在我要把这些信息浓缩到100字以内。重点包括:JobMonster漏洞、CVE编号、严重性、影响范围、攻击条件、修复版本、建议措施以及WordPress安全的整体情况。 可能的结构:JobMonster WordPress主题存在关键漏洞CVE-2025-5397,允许攻击者在启用社交登录的情况下劫持管理员账户。该漏洞影响所有版本至4.8.1,已修复于4.8.2。建议升级或禁用社交登录,并启用双因素认证等安全措施。最近WordPress主题频繁成为攻击目标,强调定期更新的重要性。 检查字数是否在限制内,确保信息准确且简洁。 </think> 威胁者利用WordPress主题JobMonster中的关键漏洞CVE-2025-5397,在启用社交登录的情况下劫持管理员账户。该漏洞影响所有版本至4.8.1,已修复于4.8.2版本。建议用户升级或禁用社交登录,并启用双因素认证等安全措施以应对威胁。 2025-11-4 09:15:20 Author: www.bleepingcomputer.com(查看原文) 阅读量:15 收藏

Hackers exploit critical auth bypass flaw in JobMonster WordPress theme

Threat actors are targeting a critical vulnerability in the JobMonster WordPress theme that allows hijacking of administrator accounts under certain conditions.

The malicious activity was detected by Wordfence, a WordPress security firm, after blocking multiple exploit attempts against its clients over the past 24 hours.

JobMonster, created by NooThemes, is a premium WordPress theme used by job listing sites, recruitment/hiring portals, candidate search tools, etc. The theme has over 5,500 sales on Envato.

Wiz

The exploited vulnerability is identified as CVE-2025-5397 and has a critical-severity score of 9.8. It is an authentication bypass problem that imapcts all versions of the theme up to 4.8.1.

“[The flaw] is due to the check_login() function not properly verifying a user's identity prior to successfully authenticating them,” reads the flaw’s description.

“This makes it possible for unauthenticated attackers to bypass standard authentication and access administrative user accounts.”

To exploit CVE-2025-5397, social login needs to be enabled on sites using the theme; otherwise, there’s no impact.

Social login is a feature that enables users to sign in to a website using their existing social media accounts, such as “Sign in with Google,” “Login with Facebook,” and “Continue with LinkedIn.”

JobMonster trusts the external login data without verifying it properly, allowing attackers to fake admin access without holding valid credentials.

Typically, an attacker would also need to know the target administrator’s account username or email.

CVE-2025-5397 has been fixed in JobMonster version 4.8.2, currently the most recent, so users are advised to move to the patched release immediately.

If urgent action is impossible, consider the mitigation of disabling the social login function on affected websites.

It is also advisable to enable two-factor authentication for all administrator accounts, rotate credentials, and check access logs for suspicious activity.

WordPress themes have been at the epicenter of malicious activity in recent months.

Last week, Wordfence reported about malicious activity targeting the Freeio premium theme leveraging CVE-2025-11533, a critical privilege escalation flaw.

In early October, threat actors targeted CVE-2025-5947, a critical authentication bypass problem in the Service Finder WordPress theme, allowing them to log in as administrators.

In July 2025, it was reported that hackers targeted the WordPress theme 'Alone' to achieve remote code execution and perform a full site takeover, with Wordfence blocking over 120,000 attempts at the time.

WordPress plugins and themes must be updated regularly to ensure the latest security fixes are active on the sites. Patch delaying gives threat actors opportunities for successful attacks, sometimes a full year later.

Wiz

The 2026 CISO Budget Benchmark

It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026.

Learn how top leaders are turning investment into measurable impact.


文章来源: https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-auth-bypass-flaw-in-jobmonster-wordpress-theme/
如有侵权请联系:admin#unsafe.sh