VYPR
High severityNVD Advisory· Published May 26, 2023· Updated Jan 14, 2025

CVE-2023-33779

CVE-2023-33779

Description

A lateral privilege escalation vulnerability in XXL-Job v2.4.1 allows users to execute arbitrary commands on another user's account via a crafted POST request to the component /jobinfo/.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

XXL-Job v2.4.1 suffers from a lateral privilege escalation vulnerability allowing authenticated users to perform actions on other users' executors via crafted POST requests to /jobinfo/ endpoints.

Vulnerability

Overview

XXL-Job v2.4.1, a distributed task scheduling framework [1], contains a lateral privilege escalation vulnerability in its /jobinfo/ endpoints. The root cause is insufficient authorization checks: the application fails to verify that a user has permission to access or modify tasks belonging to another user's executor. This allows an authenticated user to manipulate POST request parameters to interact with tasks on any executor in the system [3].

Exploitation

An attacker must have a valid account on the XXL-Job dispatch center. By sending crafted POST requests to endpoints such as /jobinfo/pageList, /jobinfo/add, /jobinfo/update, /jobinfo/remove, /jobinfo/stop, and /jobinfo/trigger, the attacker can modify the jobGroup or other parameters to target a different user's executor [3]. No additional privileges are required beyond basic authentication.

Impact

Successful exploitation enables the attacker to view, create, modify, delete, stop, or trigger tasks on another user's executor. Since tasks can execute arbitrary commands on the executor, this effectively grants the attacker remote code execution on the victim's executor, leading to lateral movement and potential compromise of the entire scheduling environment [3].

Mitigation

As of the CVE publication date (2023-05-26), no official patch has been released. Administrators should restrict network access to the dispatch center, enforce strong authentication, and implement additional authorization controls at the application or network level until a fix is available.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
com.xuxueli:xxl-jobMaven
<= 2.4.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.