A vulnerability was identified in PowerJob up to 5.1.2. This vulnerability affects the function checkConnectivity of the file src/main/java/tech/powerjob/common/utils/net/PingPongUtils.java of the component Network Request Handler. The manipulation of the argument targetIp/targetPort leads to server-side request forgery. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
References
| Link | Resource |
|---|---|
| https://github.com/PowerJob/PowerJob/issues/1144 | Exploit Issue Tracking |
| https://github.com/PowerJob/PowerJob/issues/1144#issue-3673393002 | Exploit Issue Tracking |
| https://vuldb.com/?ctiid.335856 | Permissions Required VDB Entry |
| https://vuldb.com/?id.335856 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.702896 | Third Party Advisory VDB Entry |
| https://github.com/PowerJob/PowerJob/issues/1144 | Exploit Issue Tracking |
| https://github.com/PowerJob/PowerJob/issues/1144#issue-3673393002 | Exploit Issue Tracking |
Configurations
History
No history.
Information
Published : 2025-12-11 15:15
Updated : 2025-12-19 19:45
NVD link : CVE-2025-14518
Mitre link : CVE-2025-14518
CVE.ORG link : CVE-2025-14518
JSON object : View
Products Affected
powerjob
- powerjob
CWE
CWE-918
Server-Side Request Forgery (SSRF)
