JS Job Manager

Information

Software Type Plugin
Software Slug js-jobs (view on wordpress.org)
Software Status Active
Software Author rabilal
Software Website www.joomsky.com
Software Downloads 44,353
Software Active Installs 800
Software Record Last Updated April 14, 2025

8 Vulnerabilities

Title Status CVE ID CVSS Researchers Date
JS Job Manager <= 2.0.2 - Authenticated (Contributor+) Local File Inclusion Unpatched CVE-2025-32146 8.8 Trương Hữu Phúc (truonghuuphuc) April 4, 2025
JS Job Manager <= 2.0.2 - Missing Authorization Unpatched CVE-2025-31868 5.3 LVT-tholv2k April 1, 2025
JS Job Manager <= 2.0.2 - Authenticated Insecure Direct Object Reference Unpatched CVE-2025-31867 4.3 Tran Hoang Tuan Kiet April 1, 2025
JS Job Manager <= 2.0.0 - Cross-Site Request Forgery via multiple functions Patched CVE-2023-31087 5.4 Yuki Haruma June 2, 2023
JS Job Manager <= 2.0.0 - Missing Authorization Patched CVE-2023-28689 6.5 Fariq Fadillah Gusti Insani (fariqfgi) March 21, 2023
JS Job Manager <= 2.0.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting via title Patched CVE-2023-25963 6.4 Fariq Fadillah Gusti Insani (fariqfgi) February 21, 2023
JS Job Manager < 1.1.9 - Arbitrary Plugin Installation/Activation Patched 9.1 spacehen September 30, 2021
JS Job Manager <= 1.0.6 - Cross-Site Request Forgery Patched CVE-2018-20974 8.8 May 28, 2018

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation