| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.xuxueli:xxl-job | maven | <= 2.3.0 |
The vulnerability manifests in the user creation endpoint /gaia-job-admin/user/add. In Spring MVC applications, controller methods handling state-changing operations should be protected with CSRF tokens. The absence of @PostAuthorize, @PreAuthorize, or explicit CSRF token validation in the UserController.add method (or equivalent request mapping) makes it vulnerable. The high confidence comes from: 1) The explicit vulnerability description tying CSRF to this endpoint 2) Common Spring security patterns where unprotected POST handlers are CSRF targets 3) The attack impact requiring no existing privileges aligns with missing authorization annotations.
KEV Misses 88% of Exploited CVEs- Get the report