Impact
The identified flaw is a classic SQL injection vulnerability in the JeecgBoot 3.9.0 Online Report API endpoint `/JeecgBoot/sys/api/loadDictItemByKeyword`. By manipulating the `keyword` argument, an attacker can insert arbitrary SQL commands into the query that the application executes against its database. If successfully exploited, the attacker could read, modify, or delete sensitive data stored in the backend, potentially leading to full data compromise. The vulnerability is actionable directly over the network, as the API is reachable remotely.
Affected Systems
This vulnerability affects the JeecgBoot application version 3.9.0. The exposed code resides in the Online Report API component, which processes the `keyword` parameter. Users running this specific version of JeecgBoot should verify whether they are deploying the unpatched release.
Risk and Exploitability
The CVSS base score of 5.3 indicates a medium severity risk. The EPSS score of less than 1% suggests that, as of the latest data, exploitation attempts are expected to be rare, and the vulnerability has not been observed in the wild. It is not listed in the CISA KEV catalog, further indicating low current exploitation activity. Attacks would likely target the exposed API from an external network, crafting a malicious `keyword` payload; successful exploitation would require that the application fails to properly escape or parameterize user input.
OpenCVE Enrichment