Jeecgboot versions 3.8.2 and earlier are affected by a path traversal vulnerability. The endpoint is /sys/comment/addFile. This vulnerability allows attackers to upload files with system-whitelisted extensions to the system directory /opt, instead of the /opt/upFiles directory specified by the web server.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://github.com/jeecgboot/JeecgBoot/issues/8827 |
![]() ![]() |
History
Wed, 01 Oct 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-24 | |
Metrics |
cvssV3_1
|
Wed, 01 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Jeecgboot versions 3.8.2 and earlier are affected by a path traversal vulnerability. The endpoint is /sys/comment/addFile. This vulnerability allows attackers to upload files with system-whitelisted extensions to the system directory /opt, instead of the /opt/upFiles directory specified by the web server. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-01T20:20:03.964Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61189

Updated: 2025-10-01T20:19:58.661Z

Status : Received
Published: 2025-10-01T20:18:39.163
Modified: 2025-10-01T21:16:45.453
Link: CVE-2025-61189

No data.

No data.