JimuReport thru version 2.1.3 is vulnerable to remote code execution when processing user-controlled H2 JDBC URLs. The application passes the attacker-supplied JDBC URL directly to the H2 driver, allowing the use of certain directives to execute arbitrary Java code. A different vulnerability than CVE-2025-10770.

Project Subscriptions

Vendors Products
Jimureport Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 30 Jan 2026 01:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:jeecg:jimureport:*:*:*:*:*:*:*:*

Mon, 12 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Jeecg
Jeecg jimureport
Vendors & Products Jeecg
Jeecg jimureport

Thu, 08 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 19:45:00 +0000

Type Values Removed Values Added
Description JimuReport thru version 2.1.3 is vulnerable to remote code execution when processing user-controlled H2 JDBC URLs. The application passes the attacker-supplied JDBC URL directly to the H2 driver, allowing the use of certain directives to execute arbitrary Java code. A different vulnerability than CVE-2025-10770.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-01-08T19:44:30.895Z

Reserved: 2025-12-08T00:00:00.000Z

Link: CVE-2025-66913

cve-icon Vulnrichment

Updated: 2026-01-08T19:43:43.048Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-08T20:15:44.500

Modified: 2026-01-30T01:06:25.553

Link: CVE-2025-66913

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-12T14:38:19Z

Weaknesses