Description
Simple Job Script contains a cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating the job_type_value parameter in the jobs endpoint. Attackers can craft requests with SVG payload injection to execute arbitrary JavaScript in victim browsers and steal session cookies or perform unauthorized actions.
Exploits (1)
exploitdb
WORKING POC
by Ahmet Ümit BAYRAM · textwebappsphp
https://www.exploit-db.com/exploits/46612
References (2)
Core 2
Core References
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/46612
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/simple-job-script-cross-site-scripting-via-job-type-value-parameter
Scores
CVSS v3
6.1
EPSS
0.0008
EPSS Percentile
22.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
niteosoft/Simple Job Script
1.66
simplejobscript/simplejobscript
< 1.66
Published
Mar 04, 2026
Tracked Since
Mar 05, 2026