Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11581: Missing Authorization in PowerJob

0
Medium
VulnerabilityCVE-2025-11581cvecve-2025-11581
Published: Fri Oct 10 2025 (10/10/2025, 19:02:05 UTC)
Source: CVE Database V5
Product: PowerJob

Description

A security vulnerability has been detected in PowerJob up to 5.1.2. This vulnerability affects unknown code of the file /openApi/runJob of the component OpenAPIController. Such manipulation leads to missing authorization. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:29:38 UTC

Technical Analysis

CVE-2025-11581 is a security vulnerability identified in PowerJob, an open-source distributed job scheduling framework widely used for managing and automating batch jobs in cloud-native and enterprise environments. The vulnerability resides in the OpenAPIController component, specifically within the /openApi/runJob endpoint. This endpoint lacks proper authorization checks, allowing remote attackers to invoke job execution without authentication or permission validation. The flaw affects PowerJob versions 5.1.0, 5.1.1, and 5.1.2. Exploitation requires no privileges or user interaction and can be performed remotely over the network. The vulnerability primarily impacts the integrity of the system by enabling unauthorized job execution, which could lead to arbitrary code execution or disruption of scheduled tasks. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality (VC:L) but no impact on availability or integrity (VI:N, VA:N). Although no known exploits have been observed in the wild, public disclosure of exploit details increases the likelihood of exploitation attempts. The absence of patches at the time of reporting necessitates immediate mitigation efforts by affected organizations.

Potential Impact

The primary impact of CVE-2025-11581 is unauthorized execution of jobs within PowerJob environments, which can compromise the integrity of scheduled workflows and potentially lead to arbitrary code execution if malicious jobs are submitted. This can disrupt business-critical batch processing, data pipelines, or automation tasks, causing operational downtime or data corruption. Since the vulnerability requires no authentication, attackers can remotely exploit it without prior access, increasing the attack surface significantly. Organizations relying on PowerJob for job scheduling in cloud or hybrid environments may face increased risk of supply chain attacks, lateral movement, or privilege escalation if attackers leverage this flaw to execute malicious payloads. The lack of impact on confidentiality or availability reduces the risk of data leakage or denial of service directly from this vulnerability, but the integrity compromise alone can have serious operational consequences. The public disclosure of exploit code further elevates the threat level, potentially leading to targeted attacks against vulnerable deployments worldwide.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting network access to the /openApi/runJob endpoint by implementing firewall rules or API gateway policies to allow only trusted IP addresses or authenticated users. 2. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized requests targeting this endpoint. 3. Monitor logs and network traffic for unusual or unauthorized job execution attempts to enable rapid detection and response. 4. If possible, upgrade to a patched version of PowerJob once available; until then, consider disabling the OpenAPIController or the /openApi/runJob endpoint if it is not essential for operations. 5. Implement strict authentication and authorization mechanisms around job execution APIs, including API keys, OAuth tokens, or mutual TLS, to prevent unauthorized access. 6. Conduct thorough security reviews of job definitions and submitted tasks to detect potentially malicious payloads. 7. Educate DevOps and security teams about this vulnerability and ensure incident response plans include scenarios involving unauthorized job execution. 8. Collaborate with PowerJob maintainers or community for timely updates and patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-10T11:42:19.026Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e95d32710816ddd72d64e2

Added to database: 10/10/2025, 7:23:30 PM

Last enriched: 2/24/2026, 9:29:38 PM

Last updated: 3/26/2026, 3:04:55 AM

Views: 145

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses