VYPR
Moderate severityNVD Advisory· Published Oct 10, 2025· Updated Feb 24, 2026

PowerJob OpenAPIController runJob authorization

CVE-2025-11581

Description

A security vulnerability has been detected in PowerJob up to 5.1.2. This vulnerability affects unknown code of the file /openApi/runJob of the component OpenAPIController. Such manipulation leads to missing authorization. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

PowerJob ≤5.1.2's OpenAPIController lacks authorization on /openApi/runJob, enabling remote unauthenticated job execution.

Vulnerability

Description

CVE-2025-11581 is an authorization bypass vulnerability in PowerJob up to version 5.1.2. The flaw resides in the OpenAPIController component, specifically in the /openApi/runJob endpoint. The controller methods lack proper security annotations such as @ApiPermission, allowing unauthenticated access to sensitive operations [1]. A CodeQL analysis disclosed on GitHub revealed multiple unauthenticated endpoints within the same controller [2].

Attack

Vector and Exploitation

The vulnerability is remotely exploitable without authentication. An attacker can send crafted HTTP requests to the /openApi/runJob endpoint to invoke job execution functions that should require authorization. The project's design intended for OpenAPI endpoints to be secured, but a missing permission check leaves them exposed [2]. A proof-of-concept exploit has been publicly disclosed, increasing the risk of active exploitation.

Impact

Successful exploitation allows an unauthorized remote attacker to trigger arbitrary job executions on the PowerJob server. This can lead to unauthorized task scheduling, resource consumption, and potential disruption of scheduled workflows. Given PowerJob's role as a distributed job scheduler, this could enable further lateral movement or impact the availability of critical batch processes.

Mitigation and

Status

As of the advisory, no patched version has been released. The vendor's GitHub repository has an open issue documenting the flaw [2]. Users are advised to restrict network access to the PowerJob server, implement a web application firewall (WAF) rule to block unauthenticated requests to /openApi/* endpoints, or disable the OpenAPI module if not required [3]. The vulnerability is not yet listed in CISA's Known Exploited Vulnerabilities (KEV) catalog.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
tech.powerjob:powerjob-server-starterMaven
<= 5.1.2

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.