Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 19 Dec 2025 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in JeecgBoot up to 3.9.0. The impacted element is the function SysUserOnlineController of the file jeecg-boot/jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/controller/SysUserOnlineController.java. Executing manipulation can lead to manage user sessions. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. This patch is called b686f9fbd1917edffe5922c6362c817a9361cfbd. Applying a patch is advised to resolve this issue. | |
| Title | JeecgBoot SysUserOnlineController.java SysUserOnlineController user session | |
| Weaknesses | CWE-1018 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-19T01:02:08.043Z
Reserved: 2025-12-18T18:25:14.109Z
Link: CVE-2025-14909
No data.
Status : Received
Published: 2025-12-19T02:16:04.703
Modified: 2025-12-19T02:16:04.703
Link: CVE-2025-14909
No data.
OpenCVE Enrichment
No data.