PT-2025-50612 · Powerjob · Powerjob
Zast.Ai
·
Published
2025-12-11
·
Updated
2025-12-11
·
CVE-2025-14518
CVSS v3.1
9.8
Critical
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
PowerJob versions prior to 5.1.3
Description
A server-side request forgery condition exists in PowerJob. The issue is located within the Network Request Handler component, specifically in the
checkConnectivity() function of the file src/main/java/tech/powerjob/common/utils/net/PingPongUtils.java. Manipulation of the targetIp and targetPort arguments can lead to server-side request forgery. Remote exploitation is possible, and a public exploit is available.Recommendations
Update PowerJob to version 5.1.3 or later. As a temporary workaround, consider restricting access to the
checkConnectivity() function until a patch is available.Exploit
Fix
SSRF
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Powerjob