Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14518: Server-Side Request Forgery in PowerJob

0
Medium
VulnerabilityCVE-2025-14518cvecve-2025-14518
Published: Thu Dec 11 2025 (12/11/2025, 15:02:08 UTC)
Source: CVE Database V5
Product: PowerJob

Description

A vulnerability was identified in PowerJob up to 5.1.2. This vulnerability affects the function checkConnectivity of the file src/main/java/tech/powerjob/common/utils/net/PingPongUtils.java of the component Network Request Handler. The manipulation of the argument targetIp/targetPort leads to server-side request forgery. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 12/11/2025, 15:24:10 UTC

Technical Analysis

CVE-2025-14518 is a Server-Side Request Forgery (SSRF) vulnerability identified in PowerJob, an open-source distributed job scheduling system, affecting versions 5.1.0 through 5.1.2. The vulnerability exists in the checkConnectivity function located in src/main/java/tech/powerjob/common/utils/net/PingPongUtils.java, specifically within the Network Request Handler component. The flaw stems from insufficient validation and sanitization of the targetIp and targetPort parameters, which are used to check network connectivity. An attacker with low privileges can remotely manipulate these parameters to coerce the server into sending crafted network requests to arbitrary IP addresses and ports. This can lead to unauthorized internal network scanning, access to internal services not exposed externally, or interaction with external malicious endpoints. The vulnerability does not require user interaction and can be exploited remotely without authentication, although low-level privileges on the system are necessary. The CVSS 4.0 base score is 5.3, indicating medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability. While no known active exploitation has been reported, a public exploit exists, increasing the risk of future attacks. The vulnerability highlights the risk of SSRF in network utility functions that interact with user-controlled inputs without proper validation or network segmentation. PowerJob users should be aware of this risk, especially in environments where internal network security is critical.

Potential Impact

For European organizations, the SSRF vulnerability in PowerJob can have significant security implications. Exploiting this flaw could allow attackers to perform internal network reconnaissance, bypass firewall restrictions, and access sensitive internal services that are not directly exposed to the internet. This could lead to further lateral movement within corporate networks, data exfiltration, or disruption of critical services. Organizations using PowerJob in sectors such as finance, healthcare, energy, and government, where internal network security and data confidentiality are paramount, may face increased risks. The medium severity rating indicates that while the immediate impact may be limited, the vulnerability could serve as a foothold for more sophisticated attacks. Additionally, the presence of a public exploit increases the likelihood of opportunistic attacks targeting unpatched systems. The potential impact on availability is low, but confidentiality and integrity could be moderately affected if internal services are compromised. European companies relying on PowerJob for distributed job scheduling and network operations should consider this vulnerability a priority for remediation to maintain compliance with data protection regulations and to safeguard critical infrastructure.

Mitigation Recommendations

To mitigate CVE-2025-14518, European organizations should implement the following specific measures: 1) Immediately upgrade PowerJob to a version beyond 5.1.2 once patches are released by the vendor or community. 2) If patches are not yet available, apply temporary mitigations such as restricting network access from the PowerJob server to only trusted IP addresses and ports using firewall rules or network segmentation. 3) Implement strict input validation and sanitization on the targetIp and targetPort parameters to ensure only authorized and expected values are processed. 4) Monitor network traffic originating from PowerJob servers for unusual or unauthorized outbound connections, especially to internal IP ranges or unexpected external endpoints. 5) Employ intrusion detection or prevention systems to detect SSRF patterns or anomalous network requests. 6) Review and minimize the privileges assigned to PowerJob processes to limit the potential impact of exploitation. 7) Conduct regular security audits and penetration tests focusing on internal network access controls and SSRF vulnerabilities. 8) Educate system administrators and developers about SSRF risks and secure coding practices related to network request handling. These targeted actions will reduce the attack surface and help prevent exploitation until a permanent fix is applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-11T06:53:49.237Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693ade897d4c6f31f7b4ab8c

Added to database: 12/11/2025, 3:08:57 PM

Last enriched: 12/11/2025, 3:24:10 PM

Last updated: 12/11/2025, 8:29:59 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats