Description
Simple Job Script contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting malicious SQL code through the app_id parameter. Attackers can send POST requests to delete_application_ajax.php with crafted payloads to extract sensitive data, bypass authentication, or modify database contents.
Exploits (1)
exploitdb
WORKING POC
by Ahmet Ümit BAYRAM · textwebappsphp
https://www.exploit-db.com/exploits/46612
References (2)
Core 2
Core References
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/46612
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/simple-job-script-sql-injection-via-delete-application-ajaxphp
Scores
CVSS v3
8.2
EPSS
0.0011
EPSS Percentile
28.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-89
Status
published
Products (2)
niteosoft/Simple Job Script
1.66
simplejobscript/simplejobscript
< 1.66
Published
Mar 04, 2026
Tracked Since
Mar 05, 2026