Description
A vulnerability was identified in PowerJob 5.1.0/5.1.1/5.1.2. Impacted is an unknown function of the file powerjob-server/powerjob-server-starter/src/main/java/tech/powerjob/server/web/controller/InstanceController.java of the component detailPlus Endpoint. The manipulation of the argument customQuery leads to sql injection. Remote exploitation of the attack is possible. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-07
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A vulnerability was discovered in the detailPlus endpoint of PowerJob servers. An attacker can manipulate the customQuery parameter to inject arbitrary SQL statements, allowing the execution of unintended database commands. Remote attackers could retrieve sensitive data or alter data stored in the back‑end database, compromising confidentiality and integrity.

Affected Systems

Version 5.1.0, 5.1.1, and 5.1.2 of the PowerJob platform are affected. All instances that expose the detailPlus endpoint are susceptible, regardless of the deployment environment.

Risk and Exploitability

The severity score of 6.9 indicates moderate risk. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog. The attack requires network connectivity to the vulnerable endpoint, and successful exploitation is likely if the server accepts unvalidated SQL fragments. No patch has been officially released by the vendor, but a pull request addressing the issue is available on GitHub, suggesting that a recent revision may contain the fix.

Generated by OpenCVE AI on April 7, 2026 at 22:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PowerJob to a release newer than 5.1.2 that incorporates the fix in pull request 1166.
  • If an upgrade is not immediately possible, restrict external access to the detailPlus endpoint or isolate it behind a firewall.
  • Implement input validation to reject or sanitize the customQuery parameter.
  • Monitor logs for evidence of attempted SQL injection on the detailPlus endpoint.

Generated by OpenCVE AI on April 7, 2026 at 22:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4fp2-3xgg-jg4w PowerJob vulnerable to SQL injection
History

Wed, 08 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in PowerJob 5.1.0/5.1.1/5.1.2. Impacted is an unknown function of the file powerjob-server/powerjob-server-starter/src/main/java/tech/powerjob/server/web/controller/InstanceController.java of the component detailPlus Endpoint. The manipulation of the argument customQuery leads to sql injection. Remote exploitation of the attack is possible. The project was informed of the problem early through an issue report but has not responded yet.
Title PowerJob detailPlus Endpoint InstanceController.java sql injection
First Time appeared Powerjob
Powerjob powerjob
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:powerjob:powerjob:*:*:*:*:*:*:*:*
Vendors & Products Powerjob
Powerjob powerjob
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Powerjob Powerjob
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-08T16:15:07.755Z

Reserved: 2026-04-07T13:31:05.148Z

Link: CVE-2026-5736

cve-icon Vulnrichment

Updated: 2026-04-08T15:46:42.383Z

cve-icon NVD

Status : Deferred

Published: 2026-04-07T19:16:48.137

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5736

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:46:34Z

Weaknesses