PowerJob OpenAPI Endpoint Code Injection Vulnerability (CVE-2026-5739)
A code injection vulnerability exists in PowerJob versions 5.1.0, 5.1.1, and 5.1.2, allowing remote attackers to execute arbitrary code via the GroovyEvaluator.evaluate function in the OpenAPI Endpoint component by manipulating the nodeParams argument.
A critical code injection vulnerability, identified as CVE-2026-5739, has been discovered in PowerJob, an open-source distributed job scheduling and management platform. This vulnerability affects versions 5.1.0, 5.1.1, and 5.1.2. The vulnerability resides in the GroovyEvaluator.evaluate function of the /openApi/addWorkflowNode endpoint within the OpenAPI component. By manipulating the nodeParams argument, a remote attacker can inject and execute arbitrary code on the server. This vulnerability can be exploited without authentication, posing a significant threat to systems running vulnerable PowerJob instances. The vendor has been notified, but has not yet responded.
Attack Chain
- Attacker identifies a vulnerable PowerJob instance running versions 5.1.0, 5.1.1, or 5.1.2.
- The attacker crafts a malicious HTTP request targeting the
/openApi/addWorkflowNodeendpoint. - Within the HTTP request, the attacker injects malicious code into the
nodeParamsargument, leveraging theGroovyEvaluator.evaluatefunction. - The PowerJob server receives the request and passes the attacker-controlled
nodeParamsargument to the vulnerable function. - The
GroovyEvaluator.evaluatefunction processes the malicious code, leading to arbitrary code execution on the server. - The attacker gains control of the PowerJob server with the privileges of the PowerJob process.
- The attacker can then use this access to move laterally within the network, exfiltrate sensitive data, or cause a denial of service.
Impact
Successful exploitation of CVE-2026-5739 allows unauthenticated remote attackers to execute arbitrary code on the PowerJob server. This could lead to complete system compromise, data breaches, or disruption of critical job scheduling processes. Given the nature of job scheduling platforms, compromised servers could be used to compromise other systems in the network.
Recommendation
- Upgrade PowerJob instances to a patched version that addresses CVE-2026-5739 as soon as a patch is released by the vendor.
- Implement network segmentation to limit the impact of a potential compromise of the PowerJob server.
- Monitor web server logs for suspicious requests targeting the
/openApi/addWorkflowNodeendpoint, looking for unusual characters or patterns in thenodeParamsargument. - Deploy the Sigma rule
Detect PowerJob Groovy Code Injection Attemptto detect exploitation attempts.
Detection coverage 2
Detect PowerJob Groovy Code Injection Attempt
criticalDetects potential attempts to exploit CVE-2026-5739 by identifying suspicious requests to the /openApi/addWorkflowNode endpoint with potentially malicious code in the nodeParams argument.
PowerJob Suspicious Process Execution via Web Server
highDetects suspicious process execution originating from the web server, potentially indicating code injection exploitation in PowerJob.
Detection queries are kept inside the platform. Get full rules →