<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5739 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5739/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 20:16:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5739/feed.xml" rel="self" type="application/rss+xml"/><item><title>PowerJob OpenAPI Endpoint Code Injection Vulnerability (CVE-2026-5739)</title><link>https://feed.craftedsignal.io/briefs/2026-04-powerjob-code-injection/</link><pubDate>Tue, 07 Apr 2026 20:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-powerjob-code-injection/</guid><description>A code injection vulnerability exists in PowerJob versions 5.1.0, 5.1.1, and 5.1.2, allowing remote attackers to execute arbitrary code via the GroovyEvaluator.evaluate function in the OpenAPI Endpoint component by manipulating the nodeParams argument.</description><content:encoded><![CDATA[<p>A critical code injection vulnerability, identified as CVE-2026-5739, has been discovered in PowerJob, an open-source distributed job scheduling and management platform. This vulnerability affects versions 5.1.0, 5.1.1, and 5.1.2. The vulnerability resides in the <code>GroovyEvaluator.evaluate</code> function of the <code>/openApi/addWorkflowNode</code> endpoint within the OpenAPI component. By manipulating the <code>nodeParams</code> argument, a remote attacker can inject and execute arbitrary code on the server. This vulnerability can be exploited without authentication, posing a significant threat to systems running vulnerable PowerJob instances. The vendor has been notified, but has not yet responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable PowerJob instance running versions 5.1.0, 5.1.1, or 5.1.2.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/openApi/addWorkflowNode</code> endpoint.</li>
<li>Within the HTTP request, the attacker injects malicious code into the <code>nodeParams</code> argument, leveraging the <code>GroovyEvaluator.evaluate</code> function.</li>
<li>The PowerJob server receives the request and passes the attacker-controlled <code>nodeParams</code> argument to the vulnerable function.</li>
<li>The <code>GroovyEvaluator.evaluate</code> function processes the malicious code, leading to arbitrary code execution on the server.</li>
<li>The attacker gains control of the PowerJob server with the privileges of the PowerJob process.</li>
<li>The attacker can then use this access to move laterally within the network, exfiltrate sensitive data, or cause a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5739 allows unauthenticated remote attackers to execute arbitrary code on the PowerJob server. This could lead to complete system compromise, data breaches, or disruption of critical job scheduling processes. Given the nature of job scheduling platforms, compromised servers could be used to compromise other systems in the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PowerJob instances to a patched version that addresses CVE-2026-5739 as soon as a patch is released by the vendor.</li>
<li>Implement network segmentation to limit the impact of a potential compromise of the PowerJob server.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/openApi/addWorkflowNode</code> endpoint, looking for unusual characters or patterns in the <code>nodeParams</code> argument.</li>
<li>Deploy the Sigma rule <code>Detect PowerJob Groovy Code Injection Attempt</code> to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>code-injection</category><category>powerjob</category><category>cve-2026-5739</category></item></channel></rss>