- Advertisement -Newspaper WordPress Theme

Top 5 This Week

Related Posts

Hackers Exploit Critical JobMonster WordPress Vulnerability to Hijack Admin Accounts

Cybersecurity researchers have sounded the alarm over a critical vulnerability in the JobMonster WordPress theme that allows attackers to hijack administrator accounts under specific conditions. The flaw, identified as CVE-2025-5397, poses a severe security threat to thousands of websites using this popular theme.

According to Wordfence, a leading WordPress security company, the exploit attempts have surged over the past 24 hours. Their systems detected and blocked multiple attack waves targeting vulnerable websites running outdated versions of JobMonster.

Developed by NooThemes, JobMonster is a premium WordPress theme commonly used for job listing portals, recruitment agencies, and candidate management platforms. With over 5,500 sales on Envato, it has become one of the most widely deployed solutions in the online hiring sector — which makes the vulnerability particularly concerning.

The CVE-2025-5397 flaw carries a critical severity score of 9.8. It stems from an authentication bypass issue in the theme’s check_login() function, which fails to correctly verify a user’s identity before granting access. This loophole allows unauthenticated attackers to bypass login protections and gain administrator-level control over affected websites.

However, the vulnerability can only be exploited if the social login feature is enabled. This feature allows users to sign in using third-party accounts like Google, Facebook, or LinkedIn. JobMonster’s flawed implementation trusts the external login data without proper verification, enabling hackers to spoof credentials and access administrator panels without valid authentication.

To successfully exploit this weakness, attackers also need to know the admin username or email of the target site. Once authenticated, they can alter configurations, upload malicious files, or even inject code for long-term control.

The good news: the developers have already issued a patch in JobMonster version 4.8.2, effectively fixing the authentication issue. All users are strongly advised to upgrade immediately to this latest version to secure their sites.

For those unable to update promptly, temporary mitigations include disabling the social login feature, enabling two-factor authentication (2FA) for admin users, and monitoring access logs for suspicious sign-ins or privilege escalations. Rotating credentials and backing up site data is also recommended.

The JobMonster flaw adds to a growing list of WordPress theme vulnerabilities actively exploited by cybercriminals. In recent months, Freeio, Service Finder, and Alone themes have all been targeted in similar attacks, enabling hackers to escalate privileges, execute remote code, or take full control of compromised sites.

This ongoing trend underscores the urgent need for timely updates and consistent security hygiene among WordPress site owners. Delays in patching remain one of the biggest factors behind successful breaches, with some attackers exploiting unpatched themes months — or even years — after fixes are released.

Conclusion

The discovery of CVE-2025-5397 in JobMonster highlights a critical gap in WordPress security — the reliance on outdated or poorly maintained themes. As hackers continue to automate exploit campaigns, even small oversights like skipping a theme update can lead to devastating consequences. Website administrators must act immediately: update to version 4.8.2, disable unnecessary login features, and strengthen their site’s overall security posture before it’s too late.

Popular Articles