<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Powerjob — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/powerjob/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 20:16:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/powerjob/feed.xml" rel="self" type="application/rss+xml"/><item><title>PowerJob OpenAPI Endpoint Code Injection Vulnerability (CVE-2026-5739)</title><link>https://feed.craftedsignal.io/briefs/2026-04-powerjob-code-injection/</link><pubDate>Tue, 07 Apr 2026 20:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-powerjob-code-injection/</guid><description>A code injection vulnerability exists in PowerJob versions 5.1.0, 5.1.1, and 5.1.2, allowing remote attackers to execute arbitrary code via the GroovyEvaluator.evaluate function in the OpenAPI Endpoint component by manipulating the nodeParams argument.</description><content:encoded><![CDATA[<p>A critical code injection vulnerability, identified as CVE-2026-5739, has been discovered in PowerJob, an open-source distributed job scheduling and management platform. This vulnerability affects versions 5.1.0, 5.1.1, and 5.1.2. The vulnerability resides in the <code>GroovyEvaluator.evaluate</code> function of the <code>/openApi/addWorkflowNode</code> endpoint within the OpenAPI component. By manipulating the <code>nodeParams</code> argument, a remote attacker can inject and execute arbitrary code on the server. This vulnerability can be exploited without authentication, posing a significant threat to systems running vulnerable PowerJob instances. The vendor has been notified, but has not yet responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable PowerJob instance running versions 5.1.0, 5.1.1, or 5.1.2.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/openApi/addWorkflowNode</code> endpoint.</li>
<li>Within the HTTP request, the attacker injects malicious code into the <code>nodeParams</code> argument, leveraging the <code>GroovyEvaluator.evaluate</code> function.</li>
<li>The PowerJob server receives the request and passes the attacker-controlled <code>nodeParams</code> argument to the vulnerable function.</li>
<li>The <code>GroovyEvaluator.evaluate</code> function processes the malicious code, leading to arbitrary code execution on the server.</li>
<li>The attacker gains control of the PowerJob server with the privileges of the PowerJob process.</li>
<li>The attacker can then use this access to move laterally within the network, exfiltrate sensitive data, or cause a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5739 allows unauthenticated remote attackers to execute arbitrary code on the PowerJob server. This could lead to complete system compromise, data breaches, or disruption of critical job scheduling processes. Given the nature of job scheduling platforms, compromised servers could be used to compromise other systems in the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PowerJob instances to a patched version that addresses CVE-2026-5739 as soon as a patch is released by the vendor.</li>
<li>Implement network segmentation to limit the impact of a potential compromise of the PowerJob server.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/openApi/addWorkflowNode</code> endpoint, looking for unusual characters or patterns in the <code>nodeParams</code> argument.</li>
<li>Deploy the Sigma rule <code>Detect PowerJob Groovy Code Injection Attempt</code> to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>code-injection</category><category>powerjob</category><category>cve-2026-5739</category></item><item><title>PowerJob SQL Injection Vulnerability (CVE-2026-5736)</title><link>https://feed.craftedsignal.io/briefs/2026-04-powerjob-sqli/</link><pubDate>Tue, 07 Apr 2026 19:16:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-powerjob-sqli/</guid><description>A remote SQL injection vulnerability, CVE-2026-5736, exists in PowerJob versions 5.1.0 through 5.1.2 within the detailPlus Endpoint, potentially allowing unauthenticated attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>CVE-2026-5736 is a SQL injection vulnerability affecting PowerJob, an open-source distributed job scheduling and management platform. The vulnerability resides in the <code>InstanceController.java</code> file within the <code>powerjob-server</code> component, specifically in versions 5.1.0, 5.1.1, and 5.1.2. An attacker can remotely exploit this vulnerability by manipulating the <code>customQuery</code> argument of the <code>detailPlus</code> endpoint, injecting malicious SQL code that is then executed by the application&rsquo;s database. This could lead to unauthorized data access, modification, or deletion. Despite being reported through an issue report, the project has not yet provided a patch or mitigation. This vulnerability poses a significant risk to organizations using vulnerable versions of PowerJob, potentially enabling attackers to compromise sensitive data and disrupt critical job scheduling processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable PowerJob instance running versions 5.1.0, 5.1.1, or 5.1.2.</li>
<li>Attacker crafts a malicious SQL injection payload, targeting the <code>customQuery</code> parameter of the <code>/detailPlus</code> endpoint.</li>
<li>Attacker sends a crafted HTTP request to the vulnerable <code>/detailPlus</code> endpoint, embedding the SQL injection payload within the <code>customQuery</code> parameter.</li>
<li>The PowerJob server receives the request and processes the <code>customQuery</code> parameter without proper sanitization or validation.</li>
<li>The unsanitized <code>customQuery</code> value is incorporated into an SQL query executed against the PowerJob database.</li>
<li>The injected SQL code is executed, allowing the attacker to bypass intended security restrictions and perform unauthorized database operations.</li>
<li>The attacker may extract sensitive data, modify existing records, or even gain control over the underlying database server.</li>
<li>Depending on the attacker&rsquo;s objectives, they may leverage the compromised database to pivot to other systems or disrupt critical job scheduling processes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5736 can lead to a complete compromise of the PowerJob server and its associated database. An attacker could potentially gain access to sensitive data related to job schedules, configurations, and execution history. They could also modify existing jobs, create new malicious jobs, or even disrupt the entire job scheduling system. The exact impact depends on the scope of data stored in the PowerJob database and the attacker&rsquo;s objectives, but could include data theft, service disruption, and potentially lateral movement within the compromised network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PowerJob to a patched version that addresses CVE-2026-5736 as soon as it becomes available from the vendor.</li>
<li>Implement input validation and sanitization on the <code>customQuery</code> parameter in the <code>detailPlus</code> endpoint to prevent SQL injection attacks.</li>
<li>Deploy the provided Sigma rule <code>Detect Suspicious PowerJob customQuery Parameter</code> to detect potential exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious requests to the <code>/detailPlus</code> endpoint containing potentially malicious SQL injection payloads, as covered in the logsource for the Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>vulnerability</category><category>powerjob</category></item></channel></rss>