{"api_version":"1","generated_at":"2026-04-23T12:00:19+00:00","cve":"CVE-2024-12213","urls":{"html":"https://cve.report/CVE-2024-12213","api":"https://cve.report/api/cve/CVE-2024-12213.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-12213","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-12213"},"summary":{"title":"WP Job Board Pro < 1.2.85 - Unauthenticated Privilege Escalation via process_register","description":"The WP Job Board Pro plugin for WordPress is vulnerable to privilege escalation in all versions up to 2.3.16. This is due to the plugin allowing a user to supply the 'role' field when registering. This makes it possible for unauthenticated attackers to register as an administrator on vulnerable sites. Please note that this may have been patched sooner, however, the oldest available version for us to confirm this is patched in was 1.2.85.","state":"PUBLISHED","assigner":"Wordfence","published_at":"2025-02-12 10:15:08","updated_at":"2026-04-08 18:19:42"},"problem_types":["CWE-266","CWE-266 CWE-266 Incorrect Privilege Assignment"],"metrics":[{"version":"3.1","source":"security@wordfence.com","type":"Secondary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/7cdfce88-b6c2-4820-9d6f-446f61b9b596?source=cve","name":"https://www.wordfence.com/threat-intel/vulnerabilities/id/7cdfce88-b6c2-4820-9d6f-446f61b9b596?source=cve","refsource":"security@wordfence.com","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://themeforest.net/item/superio-job-board-wordpress-theme/32180231","name":"https://themeforest.net/item/superio-job-board-wordpress-theme/32180231","refsource":"security@wordfence.com","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-12213","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12213","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"http://apusthemes.com/","product":"WP Job Board Pro","version":"affected 1.2.85 semver","platforms":[]}],"timeline":[{"source":"CNA","time":"2024-12-05T00:00:00.000Z","lang":"en","value":"Vendor Notified"},{"source":"CNA","time":"2025-02-11T00:00:00.000Z","lang":"en","value":"Disclosed"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Friderika Baranyai","lang":"en"}],"nvd_cpes":[{"cve_year":"2024","cve_id":"12213","vulnerable":"1","versionEndIncluding":"1.2.76","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apusthemes","cpe5":"superio","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2024","cve_id":"12213","cve":"CVE-2024-12213","epss":"0.002160000","percentile":"0.441560000","score_date":"2026-04-08","updated_at":"2026-04-09 00:05:10"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2024-12213","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2025-02-12T14:58:04.093652Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2025-02-12T16:08:13.748Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"WP Job Board Pro","vendor":"http://apusthemes.com/","versions":[{"lessThan":"1.2.85","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Friderika Baranyai"}],"descriptions":[{"lang":"en","value":"The WP Job Board Pro plugin for WordPress is vulnerable to privilege escalation in all versions up to 2.3.16. This is due to the plugin allowing a user to supply the 'role' field when registering. This makes it possible for unauthenticated attackers to register as an administrator on vulnerable sites. Please note that this may have been patched sooner, however, the oldest available version for us to confirm this is patched in was 1.2.85."}],"metrics":[{"cvssV3_1":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-266","description":"CWE-266 Incorrect Privilege Assignment","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-08T17:02:47.322Z","orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence"},"references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/7cdfce88-b6c2-4820-9d6f-446f61b9b596?source=cve"},{"url":"https://themeforest.net/item/superio-job-board-wordpress-theme/32180231"}],"timeline":[{"lang":"en","time":"2024-12-05T00:00:00.000Z","value":"Vendor Notified"},{"lang":"en","time":"2025-02-11T00:00:00.000Z","value":"Disclosed"}],"title":"WP Job Board Pro < 1.2.85 - Unauthenticated Privilege Escalation via process_register"}},"cveMetadata":{"assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","assignerShortName":"Wordfence","cveId":"CVE-2024-12213","datePublished":"2025-02-12T09:22:49.896Z","dateReserved":"2024-12-04T21:16:33.871Z","dateUpdated":"2026-04-08T17:02:47.322Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2025-02-12 10:15:08","lastModifiedDate":"2026-04-08 18:19:42","problem_types":["CWE-266","CWE-266 CWE-266 Incorrect Privilege Assignment"],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apusthemes:superio:*:*:*:*:*:wordpress:*:*","versionEndIncluding":"1.2.76","matchCriteriaId":"A4A0A3BE-CD17-439E-8D5E-BB09F2FB6393"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2024","CveId":"12213","Ordinal":"1","Title":"WP Job Board Pro < 1.2.85 - Unauthenticated Privilege Escalation","CVE":"CVE-2024-12213","Year":"2024"},"notes":[{"CveYear":"2024","CveId":"12213","Ordinal":"1","NoteData":"The WP Job Board Pro plugin for WordPress is vulnerable to privilege escalation in all versions up to 2.3.16. This is due to the plugin allowing a user to supply the 'role' field when registering. This makes it possible for unauthenticated attackers to register as an administrator on vulnerable sites. Please note that this may have been patched sooner, however, the oldest available version for us to confirm this is patched in was 1.2.85.","Type":"Description","Title":"WP Job Board Pro < 1.2.85 - Unauthenticated Privilege Escalation"}]}}}