Description
Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the job_id parameter. Attackers can send POST requests to get_job_applications_ajax.php with malicious job_id values to bypass authentication, extract sensitive data, or modify database contents.
Exploits (1)
exploitdb
WORKING POC
by Ahmet Ümit BAYRAM · textwebappsphp
https://www.exploit-db.com/exploits/46612
References (2)
Core 2
Core References
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/46612
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/simple-job-script-sql-injection-via-get-job-applications-ajaxphp
Scores
CVSS v3
8.2
EPSS
0.0032
EPSS Percentile
55.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-89
Status
published
Products (2)
niteosoft/Simple Job Script
1.66
simplejobscript/simplejobscript
< 1.66
Published
Mar 04, 2026
Tracked Since
Mar 05, 2026