Description
A vulnerability was identified in JeecgBoot 3.9.0. This vulnerability affects unknown code of the file /JeecgBoot/sys/api/loadDictItemByKeyword of the component Online Report API. Such manipulation of the argument keyword leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-02
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The identified flaw is a classic SQL injection vulnerability in the JeecgBoot 3.9.0 Online Report API endpoint `/JeecgBoot/sys/api/loadDictItemByKeyword`. By manipulating the `keyword` argument, an attacker can insert arbitrary SQL commands into the query that the application executes against its database. If successfully exploited, the attacker could read, modify, or delete sensitive data stored in the backend, potentially leading to full data compromise. The vulnerability is actionable directly over the network, as the API is reachable remotely.

Affected Systems

This vulnerability affects the JeecgBoot application version 3.9.0. The exposed code resides in the Online Report API component, which processes the `keyword` parameter. Users running this specific version of JeecgBoot should verify whether they are deploying the unpatched release.

Risk and Exploitability

The CVSS base score of 5.3 indicates a medium severity risk. The EPSS score of less than 1% suggests that, as of the latest data, exploitation attempts are expected to be rare, and the vulnerability has not been observed in the wild. It is not listed in the CISA KEV catalog, further indicating low current exploitation activity. Attacks would likely target the exposed API from an external network, crafting a malicious `keyword` payload; successful exploitation would require that the application fails to properly escape or parameterize user input.

Generated by OpenCVE AI on April 18, 2026 at 00:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest JeecgBoot release once the vendor issues a patch for the `/JeecgBoot/sys/api/loadDictItemByKeyword` endpoint.
  • Until a patch is available, restrict external access to the online report API by placing it behind a firewall, VPN, or limiting IP ranges to trusted networks.
  • Apply input validation on the `keyword` parameter, ensuring it contains only allowed characters or length, and use prepared statements or ORM features to prevent SQL injection.
  • Monitor logs for unusual request patterns to the `/JeecgBoot/sys/api/loadDictItemByKeyword` endpoint and block or alert on suspicious activity.

Generated by OpenCVE AI on April 18, 2026 at 00:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Jeecg jeecg Boot
CPEs cpe:2.3:a:jeecg:jeecg_boot:3.9.0:*:*:*:*:*:*:*
Vendors & Products Jeecg jeecg Boot

Wed, 04 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Jeecg
Jeecg jeecgboot
Vendors & Products Jeecg
Jeecg jeecgboot

Mon, 02 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Feb 2026 06:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in JeecgBoot 3.9.0. This vulnerability affects unknown code of the file /JeecgBoot/sys/api/loadDictItemByKeyword of the component Online Report API. Such manipulation of the argument keyword leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title JeecgBoot Online Report API loadDictItemByKeyword sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Jeecg Jeecg Boot Jeecgboot
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:14:39.304Z

Reserved: 2026-02-01T17:12:43.880Z

Link: CVE-2026-1746

cve-icon Vulnrichment

Updated: 2026-02-02T17:50:45.479Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-02T06:16:21.160

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1746

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:45:32Z

Weaknesses