CVE-2025-11580: Missing Authorization in PowerJob
A weakness has been identified in PowerJob up to 5.1.2. This affects the function list of the file /user/list. This manipulation causes missing authorization. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-11580 is a vulnerability identified in PowerJob, a distributed job scheduling system, affecting versions 5.1.0 through 5.1.2. The flaw exists in the /user/list API endpoint, where authorization checks are missing, allowing any remote attacker to retrieve user listing information without authentication or privileges. This missing authorization vulnerability means that the system does not verify whether the requester has the right to access the user list, potentially exposing sensitive user data. The vulnerability can be exploited remotely over the network without requiring user interaction or prior authentication, making it relatively easy to exploit. The CVSS 4.0 base score of 6.9 (medium severity) reflects a network attack vector with low complexity and no privileges required, but with limited impact confined primarily to confidentiality (user data exposure) and no direct impact on integrity or availability. Although no confirmed active exploitation in the wild has been reported, the availability of a public exploit increases the risk of future attacks. The vulnerability highlights the importance of proper access control enforcement on API endpoints, especially those exposing user or system information. PowerJob users should monitor for unusual access patterns to the /user/list endpoint and apply security patches or mitigations as soon as they become available to prevent unauthorized data disclosure.
Potential Impact
For European organizations, the primary impact of CVE-2025-11580 is unauthorized disclosure of user information managed by PowerJob. This could facilitate further reconnaissance and targeted attacks by exposing usernames or other user-related metadata. In environments where PowerJob orchestrates critical job scheduling, attackers gaining user information could attempt privilege escalation or lateral movement. Although the vulnerability does not directly affect system integrity or availability, the exposure of user data can undermine organizational security posture and compliance with data protection regulations such as GDPR. Organizations relying on PowerJob for enterprise or infrastructure automation may face increased risk of targeted attacks if this vulnerability is exploited. The presence of a public exploit increases urgency for mitigation to avoid potential data breaches and subsequent reputational or regulatory consequences.
Mitigation Recommendations
Since no official patches are currently linked, organizations should implement immediate compensating controls. These include restricting network access to the PowerJob management interface, especially the /user/list endpoint, using firewall rules or network segmentation to limit exposure to trusted administrators only. Employ web application firewalls (WAFs) to detect and block unauthorized requests targeting this endpoint. Monitor logs for unusual or unauthorized access attempts to /user/list and establish alerting mechanisms. If possible, disable or restrict the /user/list API endpoint until a patch is available. Engage with the PowerJob vendor or community to obtain security updates promptly and apply them as soon as released. Additionally, conduct internal audits of user permissions and access controls to minimize the impact of any potential data exposure. Educate security teams about this vulnerability and update incident response plans to include detection and mitigation steps for this specific threat.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-11580: Missing Authorization in PowerJob
Description
A weakness has been identified in PowerJob up to 5.1.2. This affects the function list of the file /user/list. This manipulation causes missing authorization. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-11580 is a vulnerability identified in PowerJob, a distributed job scheduling system, affecting versions 5.1.0 through 5.1.2. The flaw exists in the /user/list API endpoint, where authorization checks are missing, allowing any remote attacker to retrieve user listing information without authentication or privileges. This missing authorization vulnerability means that the system does not verify whether the requester has the right to access the user list, potentially exposing sensitive user data. The vulnerability can be exploited remotely over the network without requiring user interaction or prior authentication, making it relatively easy to exploit. The CVSS 4.0 base score of 6.9 (medium severity) reflects a network attack vector with low complexity and no privileges required, but with limited impact confined primarily to confidentiality (user data exposure) and no direct impact on integrity or availability. Although no confirmed active exploitation in the wild has been reported, the availability of a public exploit increases the risk of future attacks. The vulnerability highlights the importance of proper access control enforcement on API endpoints, especially those exposing user or system information. PowerJob users should monitor for unusual access patterns to the /user/list endpoint and apply security patches or mitigations as soon as they become available to prevent unauthorized data disclosure.
Potential Impact
For European organizations, the primary impact of CVE-2025-11580 is unauthorized disclosure of user information managed by PowerJob. This could facilitate further reconnaissance and targeted attacks by exposing usernames or other user-related metadata. In environments where PowerJob orchestrates critical job scheduling, attackers gaining user information could attempt privilege escalation or lateral movement. Although the vulnerability does not directly affect system integrity or availability, the exposure of user data can undermine organizational security posture and compliance with data protection regulations such as GDPR. Organizations relying on PowerJob for enterprise or infrastructure automation may face increased risk of targeted attacks if this vulnerability is exploited. The presence of a public exploit increases urgency for mitigation to avoid potential data breaches and subsequent reputational or regulatory consequences.
Mitigation Recommendations
Since no official patches are currently linked, organizations should implement immediate compensating controls. These include restricting network access to the PowerJob management interface, especially the /user/list endpoint, using firewall rules or network segmentation to limit exposure to trusted administrators only. Employ web application firewalls (WAFs) to detect and block unauthorized requests targeting this endpoint. Monitor logs for unusual or unauthorized access attempts to /user/list and establish alerting mechanisms. If possible, disable or restrict the /user/list API endpoint until a patch is available. Engage with the PowerJob vendor or community to obtain security updates promptly and apply them as soon as released. Additionally, conduct internal audits of user permissions and access controls to minimize the impact of any potential data exposure. Educate security teams about this vulnerability and update incident response plans to include detection and mitigation steps for this specific threat.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-10T11:42:16.172Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e94f461df34bad8db23a6d
Added to database: 10/10/2025, 6:24:06 PM
Last enriched: 10/10/2025, 6:24:27 PM
Last updated: 10/10/2025, 9:56:37 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11589: SQL Injection in CodeAstro Gym Management System
MediumCVE-2025-11588: SQL Injection in CodeAstro Gym Management System
MediumCVE-2025-11586: Stack-based Buffer Overflow in Tenda AC7
HighCVE-2025-11585: SQL Injection in code-projects Project Monitoring System
MediumCVE-2025-11584: SQL Injection in code-projects Online Job Search Engine
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.