๐Ÿ” CVE Alert

CVE-2026-7305

MEDIUM 6.3

Xuxueli xxl-job trigger Endpoint XxlJobServiceImpl.java triggerJob server-side request forgery

CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th

A weakness has been identified in Xuxueli xxl-job up to 3.3.2. The affected element is the function triggerJob of the file xxl-job-admin/src/main/java/com/xxl/job/admin/service/impl/XxlJobServiceImpl.java of the component trigger Endpoint. This manipulation of the argument addressList causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. There is ongoing doubt regarding the real existence of this vulnerability. The project maintainer explains (translated from Chinese): "Triggers are manually activated and involve login and access control, thus requiring management." The pull request by the researcher got rejected because of that.

CWE CWE-918
Vendor xuxueli
Product xxl-job
Published Apr 28, 2026
Stay Ahead of the Next One

Get instant alerts for xuxueli xxl-job

Be the first to know when new medium vulnerabilities affecting xuxueli xxl-job are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Xuxueli / xxl-job
3.3.0 3.3.1 3.3.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/359960 vuldb.com: https://vuldb.com/vuln/359960/cti vuldb.com: https://vuldb.com/submit/803076 github.com: https://github.com/xuxueli/xxl-job/issues/3935 github.com: https://github.com/xuxueli/xxl-job/pull/3937 github.com: https://github.com/xuxueli/xxl-job/

Credits

๐Ÿ” larlarua (VulDB User) VulDB CNA Team