{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-3733","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-07T18:00:25.805Z","datePublished":"2026-03-08T11:02:14.508Z","dateUpdated":"2026-03-11T19:52:45.982Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-08T11:02:14.508Z"},"title":"xuxueli xxl-job JobInfoController.java server-side request forgery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-918","lang":"en","description":"Server-Side Request Forgery"}]}],"affected":[{"vendor":"xuxueli","product":"xxl-job","versions":[{"version":"3.3.0","status":"affected"},{"version":"3.3.1","status":"affected"},{"version":"3.3.2","status":"affected"}],"cpes":["cpe:2.3:a:xuxueli:xxl-job:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in xuxueli xxl-job up to 3.3.2. This impacts an unknown function of the file source-code/src/main/java/com/xxl/job/admin/controller/JobInfoController.java. The manipulation results in server-side request forgery. It is possible to launch the attack remotely. The exploit is now public and may be used. The project maintainer closed the issue report with the following statement: \"Access token security verification is required.\" (translated from Chinese)"}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-07T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-07T19:05:32.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"ZAST.AI (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.349711","name":"VDB-349711 | xuxueli xxl-job JobInfoController.java server-side request forgery","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.349711","name":"VDB-349711 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.767226","name":"Submit #767226 | xuxueli xxl-job <=3.3.2 SSRF","tags":["third-party-advisory"]},{"url":"https://github.com/xuxueli/xxl-job/issues/3924","tags":["issue-tracking"]},{"url":"https://github.com/xuxueli/xxl-job/issues/3924#issue-3987941359","tags":["exploit","issue-tracking"]},{"url":"https://github.com/xuxueli/xxl-job/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-11T19:52:40.305697Z","id":"CVE-2026-3733","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-11T19:52:45.982Z"}}]}}