Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8xqm-6fj2-hfgf | PowerJob has a server-side request forgery vulnerability in PingPongUtils.java |
Tue, 24 Feb 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 19 Dec 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:powerjob:powerjob:*:*:*:*:*:*:*:* |
Thu, 11 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Powerjob
Powerjob powerjob |
|
| Vendors & Products |
Powerjob
Powerjob powerjob |
Thu, 11 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in PowerJob up to 5.1.2. This vulnerability affects the function checkConnectivity of the file src/main/java/tech/powerjob/common/utils/net/PingPongUtils.java of the component Network Request Handler. The manipulation of the argument targetIp/targetPort leads to server-side request forgery. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. | |
| Title | PowerJob Network Request PingPongUtils.java checkConnectivity server-side request forgery | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-24T05:46:06.690Z
Reserved: 2025-12-11T06:53:49.237Z
Link: CVE-2025-14518
Updated: 2025-12-11T15:27:15.462Z
Status : Modified
Published: 2025-12-11T15:15:47.333
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-14518
No data.
OpenCVE Enrichment
Updated: 2025-12-11T21:37:47Z
Github GHSA