Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14518: Server-Side Request Forgery in PowerJob

0
Medium
VulnerabilityCVE-2025-14518cvecve-2025-14518
Published: Thu Dec 11 2025 (12/11/2025, 15:02:08 UTC)
Source: CVE Database V5
Product: PowerJob

Description

A vulnerability was identified in PowerJob up to 5.1.2. This vulnerability affects the function checkConnectivity of the file src/main/java/tech/powerjob/common/utils/net/PingPongUtils.java of the component Network Request Handler. The manipulation of the argument targetIp/targetPort leads to server-side request forgery. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:55:08 UTC

Technical Analysis

CVE-2025-14518 is a server-side request forgery (SSRF) vulnerability identified in PowerJob, an open-source distributed job scheduling platform, affecting versions 5.1.0 through 5.1.2. The vulnerability exists in the checkConnectivity function located in src/main/java/tech/powerjob/common/utils/net/PingPongUtils.java, part of the Network Request Handler component. Specifically, the function improperly validates the targetIp and targetPort arguments, allowing an attacker to manipulate these inputs to coerce the server into making arbitrary network requests. This can lead to the server sending requests to internal or otherwise protected network resources that the attacker cannot directly access, potentially exposing sensitive information or enabling further attacks such as internal port scanning or exploitation of internal services. The vulnerability can be exploited remotely without user interaction but requires low-level privileges on the system, indicating that an attacker must have some authenticated access or limited permissions. The CVSS 4.0 base score is 5.3, reflecting a medium severity level due to the potential impact on confidentiality, integrity, and availability, combined with the ease of exploitation. No patches or fixes are explicitly linked in the provided data, but users are advised to monitor for updates. Although no active exploitation in the wild has been reported, a public exploit is available, increasing the urgency for mitigation. This vulnerability underscores the risks of insufficient input validation in network request handling within distributed job scheduling platforms.

Potential Impact

The SSRF vulnerability in PowerJob can have significant impacts on organizations using affected versions. Attackers exploiting this flaw can leverage the server to access internal network resources that are typically inaccessible externally, potentially leading to unauthorized data disclosure, internal reconnaissance, or pivoting to other internal systems. This can compromise confidentiality by exposing sensitive internal services and data, and may affect integrity if attackers use the SSRF to interact with internal APIs or services that modify data. Availability could also be impacted if the attacker uses the SSRF to trigger resource-intensive requests or attacks on internal infrastructure. Given PowerJob’s role in orchestrating distributed job execution, exploitation could disrupt automated workflows or lead to unauthorized job execution. Organizations with complex internal networks or sensitive internal services are at higher risk. The medium CVSS score reflects that while the vulnerability is exploitable remotely and without user interaction, it requires some level of privilege, limiting the attack surface but still posing a notable risk. The availability of a public exploit increases the likelihood of attempted attacks, especially in environments where patching is delayed.

Mitigation Recommendations

To mitigate CVE-2025-14518, organizations should take several specific actions beyond generic advice: 1) Immediately restrict network access to the PowerJob server, limiting outbound connections to only trusted and necessary destinations to reduce the SSRF attack surface. 2) Implement strict input validation and sanitization on the targetIp and targetPort parameters in the checkConnectivity function or any similar network request handling code, ensuring only authorized and expected IP addresses and ports are accepted. 3) Monitor network traffic originating from PowerJob servers for unusual or unauthorized outbound requests that may indicate exploitation attempts. 4) Apply network segmentation to isolate PowerJob servers from sensitive internal services to limit potential SSRF impact. 5) Upgrade PowerJob to a patched version once available from the vendor or community, or apply vendor-provided patches promptly. 6) Employ application-layer firewalls or web application firewalls (WAFs) with rules designed to detect and block SSRF patterns targeting PowerJob. 7) Review and restrict user privileges on PowerJob to the minimum necessary, as exploitation requires low privileges but not full administrative rights. 8) Conduct regular security assessments and code reviews focusing on network request handling components to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-11T06:53:49.237Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693ade897d4c6f31f7b4ab8c

Added to database: 12/11/2025, 3:08:57 PM

Last enriched: 2/24/2026, 10:55:08 PM

Last updated: 3/24/2026, 12:56:50 AM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses