Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11580: Missing Authorization in PowerJob

0
Medium
VulnerabilityCVE-2025-11580cvecve-2025-11580
Published: Fri Oct 10 2025 (10/10/2025, 18:02:05 UTC)
Source: CVE Database V5
Product: PowerJob

Description

A weakness has been identified in PowerJob up to 5.1.2. This affects the function list of the file /user/list. This manipulation causes missing authorization. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:29:26 UTC

Technical Analysis

CVE-2025-11580 is a security vulnerability identified in PowerJob, an open-source distributed task scheduling framework, affecting versions 5.1.0 through 5.1.2. The vulnerability arises due to missing authorization checks on the /user/list API endpoint, which is intended to provide a list of users. Because the authorization mechanism is absent or improperly implemented, remote attackers can invoke this endpoint without authentication or permission, thereby gaining unauthorized access to potentially sensitive user information. The vulnerability is remotely exploitable without any user interaction or privileges, making it straightforward to abuse. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no privileges or user interaction required, and partial impact on confidentiality. Although the vulnerability does not directly affect integrity or availability, the unauthorized disclosure of user data can facilitate further attacks such as social engineering or privilege escalation. The exploit code has been publicly disclosed, increasing the likelihood of exploitation despite no current reports of active exploitation in the wild. No official patches have been linked yet, so mitigation relies on access control and monitoring. This vulnerability highlights the critical need for proper authorization enforcement in API endpoints, especially those exposing user data.

Potential Impact

The primary impact of CVE-2025-11580 is unauthorized disclosure of user information due to missing authorization on the /user/list endpoint. This can lead to confidentiality breaches, exposing usernames or other user-related data that could be leveraged for further attacks such as phishing, credential stuffing, or privilege escalation attempts. While the vulnerability does not directly compromise system integrity or availability, the exposure of user data can weaken overall security posture and increase risk of subsequent attacks. Organizations relying on PowerJob for task scheduling in critical environments may face increased risk of targeted attacks if adversaries gain insight into user accounts. The ease of exploitation (no authentication or user interaction required) and public availability of exploit code elevate the threat level. However, the scope is limited to systems running vulnerable PowerJob versions and exposing the affected endpoint to untrusted networks. Without mitigation, attackers could remotely enumerate users, potentially aiding reconnaissance and lateral movement within affected environments.

Mitigation Recommendations

1. Immediately restrict network access to the /user/list endpoint by implementing firewall rules or network segmentation to limit exposure to trusted internal networks only. 2. If possible, disable or restrict the /user/list API endpoint until a vendor patch is available. 3. Monitor logs and network traffic for unusual or unauthorized access attempts to the /user/list endpoint to detect exploitation attempts early. 4. Apply principle of least privilege by ensuring that only authorized users and systems can access sensitive API endpoints. 5. Stay updated with PowerJob vendor announcements and apply official patches or updates as soon as they are released. 6. Implement Web Application Firewall (WAF) rules to detect and block unauthorized requests targeting the vulnerable endpoint. 7. Conduct internal audits of API authorization mechanisms across all endpoints to prevent similar authorization bypass issues. 8. Educate development and security teams about secure API design and the importance of robust authorization checks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-10T11:42:16.172Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e94f461df34bad8db23a6d

Added to database: 10/10/2025, 6:24:06 PM

Last enriched: 2/24/2026, 9:29:26 PM

Last updated: 3/24/2026, 8:32:59 PM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses