A critical authentication bypass vulnerability (CVE-2025-5397) has been discovered in the JobMonster WordPress theme, widely used for job board and recruitment websites. Security researchers at Wordfence report that the flaw is being actively exploited in the wild, allowing attackers to gain administrator-level access without valid credentials. The vulnerability affects versions up to 4.8.1 and arises when the theme’s social login feature is enabled. Attackers can abuse this logic flaw to impersonate existing site users, including administrators, leading to full site compromise. The issue poses a significant risk for WordPress sites using JobMonster, as threat actors are currently scanning for vulnerable installations. A patched version (4.8.2) has been released by the developer, and immediate upgrading is strongly advised to prevent exploitation. The root cause of CVE-2025-5397 lies in improper authentication handling within JobMonster’s social login integration. The vulnerable function check_login() fails to properly validate user identity tokens received from third-party login providers. When exploited, this allows unauthenticated attackers to forge a login request and directly authenticate as an existing user most critically, as an administrator without needing a valid password. Attackers can exploit the flaw simply by sending a specially crafted POST request to the affected endpoint, referencing the target’s username or email address. Because the theme trusts external authentication data without verifying its legitimacy, the attacker is granted administrative privileges. Successful exploitation results in complete control over the site, enabling the modification of content, addition of malicious plugins, or full takeover of the WordPress installation. Wordfence emphasized that this vulnerability is only exploitable when the social login option is enabled, making it essential for site administrators to disable the feature immediately if updates cannot be applied.
A critical security flaw in Oracle WebLogic Server has rapidly become a prime target for attackers worldwide. Identified as CVE-2026-21962, the issue carries the highest possible s...
A new Windows malware called ResokerRAT has been discovered, which allows attackers to secretly control infected systems. This malware uses Telegram instead of traditional servers ...
A vulnerability has been identified in Google Cloud’s Vertex AI platform that could allow unauthorized users to access sensitive data associated with machine learning workloads. ...