Description
A weakness has been identified in JeecgBoot up to 3.9.0. Affected by this issue is some unknown functionality of the file /airag/knowledge/doc/edit of the component Retrieval-Augmented Generation Module. Executing a manipulation of the argument filePath can lead to path traversal. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-07
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Path traversal leading to remote exploitation
Action: Apply patch
AI Analysis

Impact

A path traversal weakness exists in the Retrieval-Augmented Generation Module of JeecgBoot up to version 3.9.0. The flaw is triggered by manipulating the filePath argument in the /airag/knowledge/doc/edit endpoint, allowing attackers to read or write arbitrary files on the server. Because the input is processed without proper validation, an unauthenticated attacker can exploit the vulnerability remotely, potentially compromising sensitive data or modifying application files.

Affected Systems

JeecgBoot applications running version 3.9.0 or earlier, specifically the Retrieval-Augmented Generation component that exposes the /airag/knowledge/doc/edit API. The fault resides in the file handling logic accessed through the filePath parameter.

Risk and Exploitability

The CVSS score of 5.3 reflects moderate severity. The EPSS score is below 1%, indicating a low likelihood of active exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. Nevertheless, publicly available exploits exist, and the attack can be carried out remotely via crafted HTTP requests. Because no official fix has been released by the vendor, the risk remains for all installations of the affected versions.

Generated by OpenCVE AI on April 17, 2026 at 22:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade JeecgBoot to a version that includes a fix for the path traversal in the Retrieval-Augmented Generation Module.
  • If an update is not immediately possible, enforce strict validation or sanitization of the filePath argument to remove any directory traversal characters before processing.
  • Place the application behind a web application firewall or network perimeter controls that block or strictly filter requests to the /airag/knowledge/doc/edit endpoint.

Generated by OpenCVE AI on April 17, 2026 at 22:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Mar 2026 00:30:00 +0000

Type Values Removed Values Added
First Time appeared Jeecg jeecg Boot
CPEs cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*
Vendors & Products Jeecg jeecg Boot

Tue, 10 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Jeecg
Jeecg jeecgboot
Vendors & Products Jeecg
Jeecg jeecgboot

Sat, 07 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in JeecgBoot up to 3.9.0. Affected by this issue is some unknown functionality of the file /airag/knowledge/doc/edit of the component Retrieval-Augmented Generation Module. Executing a manipulation of the argument filePath can lead to path traversal. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title JeecgBoot Retrieval-Augmented Generation edit path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Jeecg Jeecg Boot Jeecgboot
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:34:39.570Z

Reserved: 2026-02-06T14:30:27.171Z

Link: CVE-2026-2111

cve-icon Vulnrichment

Updated: 2026-02-10T16:13:12.425Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-07T21:15:45.500

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2111

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:15:29Z

Weaknesses