| Title | xuxueli xxl-job <=3.3.2 SSRF |
|---|
| Description | A SSRF vulnerability was discovered at /jobinfo/trigger in latest version of xxl-job. The target URI parameter for network requests is user-controllable and lacks sufficient security processing, resulting in an SSRF vulnerability that allows attackers to exploit this flaw to probe and exploit internal services of the target system. |
|---|
| Source | ⚠️ https://github.com/xuxueli/xxl-job/issues/3924 |
|---|
| User | ZAST.AI (UID 87884) |
|---|
| Submission | 02/25/2026 09:27 (2 months ago) |
|---|
| Moderation | 03/07/2026 19:00 (10 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 349711 [xuxueli xxl-job up to 3.3.2 JobInfoController.java server-side request forgery] |
|---|
| Points | 19 |
|---|