Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the employerid parameter. Attackers can send POST requests to the register-recruiters endpoint with time-based SQL injection payloads to extract sensitive data or modify database contents.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/46612 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/simple-job-script-sql-injection-via-register-recruiters-endpoint | Third Party Advisory |
Configurations
History
06 Mar 2026, 20:47
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:simplejobscript:simplejobscript:*:*:*:*:*:*:*:* | |
| First Time |
Simplejobscript
Simplejobscript simplejobscript |
|
| References | () https://www.exploit-db.com/exploits/46612 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/simple-job-script-sql-injection-via-register-recruiters-endpoint - Third Party Advisory |
04 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-04 18:16
Updated : 2026-03-06 20:47
NVD link : CVE-2019-25500
Mitre link : CVE-2019-25500
CVE.ORG link : CVE-2019-25500
JSON object : View
Products Affected
simplejobscript
- simplejobscript
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
