PowerJob OpenAPIController runJob authorization
Description
A security vulnerability has been detected in PowerJob up to 5.1.2. This vulnerability affects unknown code of the file /openApi/runJob of the component OpenAPIController. Such manipulation leads to missing authorization. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
PowerJob ≤5.1.2's OpenAPIController lacks authorization on /openApi/runJob, enabling remote unauthenticated job execution.
Vulnerability
Description
CVE-2025-11581 is an authorization bypass vulnerability in PowerJob up to version 5.1.2. The flaw resides in the OpenAPIController component, specifically in the /openApi/runJob endpoint. The controller methods lack proper security annotations such as @ApiPermission, allowing unauthenticated access to sensitive operations [1]. A CodeQL analysis disclosed on GitHub revealed multiple unauthenticated endpoints within the same controller [2].
Attack
Vector and Exploitation
The vulnerability is remotely exploitable without authentication. An attacker can send crafted HTTP requests to the /openApi/runJob endpoint to invoke job execution functions that should require authorization. The project's design intended for OpenAPI endpoints to be secured, but a missing permission check leaves them exposed [2]. A proof-of-concept exploit has been publicly disclosed, increasing the risk of active exploitation.
Impact
Successful exploitation allows an unauthorized remote attacker to trigger arbitrary job executions on the PowerJob server. This can lead to unauthorized task scheduling, resource consumption, and potential disruption of scheduled workflows. Given PowerJob's role as a distributed job scheduler, this could enable further lateral movement or impact the availability of critical batch processes.
Mitigation and
Status
As of the advisory, no patched version has been released. The vendor's GitHub repository has an open issue documenting the flaw [2]. Users are advised to restrict network access to the PowerJob server, implement a web application firewall (WAF) rule to block unauthenticated requests to /openApi/* endpoints, or disable the OpenAPI module if not required [3]. The vulnerability is not yet listed in CISA's Known Exploited Vulnerabilities (KEV) catalog.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
tech.powerjob:powerjob-server-starterMaven | <= 5.1.2 | — |
Affected products
2- PowerJob/PowerJobdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/PowerJob/PowerJob/issues/1128ghsaexploitissue-trackingWEB
- github.com/advisories/GHSA-9wq6-87hw-6mhcghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-11581ghsaADVISORY
- vuldb.comghsathird-party-advisoryWEB
- vuldb.comghsasignaturepermissions-requiredWEB
- vuldb.comghsavdb-entrytechnical-descriptionWEB
News mentions
0No linked articles in our index yet.