Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11580: Missing Authorization in PowerJob

0
Medium
VulnerabilityCVE-2025-11580cvecve-2025-11580
Published: Fri Oct 10 2025 (10/10/2025, 18:02:05 UTC)
Source: CVE Database V5
Product: PowerJob

Description

A weakness has been identified in PowerJob up to 5.1.2. This affects the function list of the file /user/list. This manipulation causes missing authorization. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 10/10/2025, 18:24:27 UTC

Technical Analysis

CVE-2025-11580 is a vulnerability identified in PowerJob, a distributed job scheduling system, affecting versions 5.1.0 through 5.1.2. The flaw exists in the /user/list API endpoint, where authorization checks are missing, allowing any remote attacker to retrieve user listing information without authentication or privileges. This missing authorization vulnerability means that the system does not verify whether the requester has the right to access the user list, potentially exposing sensitive user data. The vulnerability can be exploited remotely over the network without requiring user interaction or prior authentication, making it relatively easy to exploit. The CVSS 4.0 base score of 6.9 (medium severity) reflects a network attack vector with low complexity and no privileges required, but with limited impact confined primarily to confidentiality (user data exposure) and no direct impact on integrity or availability. Although no confirmed active exploitation in the wild has been reported, the availability of a public exploit increases the risk of future attacks. The vulnerability highlights the importance of proper access control enforcement on API endpoints, especially those exposing user or system information. PowerJob users should monitor for unusual access patterns to the /user/list endpoint and apply security patches or mitigations as soon as they become available to prevent unauthorized data disclosure.

Potential Impact

For European organizations, the primary impact of CVE-2025-11580 is unauthorized disclosure of user information managed by PowerJob. This could facilitate further reconnaissance and targeted attacks by exposing usernames or other user-related metadata. In environments where PowerJob orchestrates critical job scheduling, attackers gaining user information could attempt privilege escalation or lateral movement. Although the vulnerability does not directly affect system integrity or availability, the exposure of user data can undermine organizational security posture and compliance with data protection regulations such as GDPR. Organizations relying on PowerJob for enterprise or infrastructure automation may face increased risk of targeted attacks if this vulnerability is exploited. The presence of a public exploit increases urgency for mitigation to avoid potential data breaches and subsequent reputational or regulatory consequences.

Mitigation Recommendations

Since no official patches are currently linked, organizations should implement immediate compensating controls. These include restricting network access to the PowerJob management interface, especially the /user/list endpoint, using firewall rules or network segmentation to limit exposure to trusted administrators only. Employ web application firewalls (WAFs) to detect and block unauthorized requests targeting this endpoint. Monitor logs for unusual or unauthorized access attempts to /user/list and establish alerting mechanisms. If possible, disable or restrict the /user/list API endpoint until a patch is available. Engage with the PowerJob vendor or community to obtain security updates promptly and apply them as soon as released. Additionally, conduct internal audits of user permissions and access controls to minimize the impact of any potential data exposure. Educate security teams about this vulnerability and update incident response plans to include detection and mitigation steps for this specific threat.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-10T11:42:16.172Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e94f461df34bad8db23a6d

Added to database: 10/10/2025, 6:24:06 PM

Last enriched: 10/10/2025, 6:24:27 PM

Last updated: 10/10/2025, 9:56:37 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats