Description
A weakness has been identified in JeecgBoot 3.9.0. Affected by this vulnerability is an unknown functionality of the file /sys/common/uploadImgByHttp. Executing a manipulation of the argument fileUrl can lead to server-side request forgery. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-22
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery (SSRF)
Action: Apply Patch
AI Analysis

Impact

The flaw is in the uploadImgByHttp endpoint of JeecgBoot 3.9.0. By manipulating the fileUrl argument an attacker can cause the server to fetch arbitrary URLs, enabling SSRF. Remote attackers can use the exported parameter to reach internal services or perform data exfiltration. The vulnerability is a CWE‑918 weakness and does not require elevated privileges—once the server is tricked into making the request, the attacker gains the ability to fetch any network resource from the server’s point of view.

Affected Systems

JeecgBoot 3.9.0 deployments. The vulnerability affects the /sys/common/uploadImgByHttp functionality and any installations that include this file. The product is JeecgBoot as listed by the CNA.

Risk and Exploitability

The CVSS v3.1 score of 5.3 indicates moderate severity, and the EPSS score of less than 1% shows a very low probability of exploitation at the time of this analysis. However, the flaw is publicly disclosed and not currently listed in the CISA KEV catalog. The endpoint can be reached remotely and no authentication is explicitly mentioned, which allows an attacker to craft a malicious fileUrl from the outside, making the attack surface straightforward for an external adversary.

Generated by OpenCVE AI on April 17, 2026 at 16:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade JeecgBoot to a version that fixes the SSRF flaw or apply the vendor‐supplied patch if available.
  • If an upgrade is not immediately possible, enforce strict validation or sanitization of the fileUrl parameter to reject URLs containing protocol schemes such as http://, https://, or any internal host references.
  • Limit the application’s outbound network connectivity by configuring a firewall or proxy to restrict which external hosts the server may contact, thereby reducing the impact of a successful SSRF.
  • Monitor outbound traffic from the application for anomalous requests and review logs for evidence of unauthorized network reachability.

Generated by OpenCVE AI on April 17, 2026 at 16:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Mar 2026 00:30:00 +0000

Type Values Removed Values Added
First Time appeared Jeecg jeecg Boot
CPEs cpe:2.3:a:jeecg:jeecg_boot:3.9.0:*:*:*:*:*:*:*
Vendors & Products Jeecg jeecg Boot

Thu, 26 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Jeecg
Jeecg jeecgboot
Vendors & Products Jeecg
Jeecg jeecgboot

Sun, 22 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in JeecgBoot 3.9.0. Affected by this vulnerability is an unknown functionality of the file /sys/common/uploadImgByHttp. Executing a manipulation of the argument fileUrl can lead to server-side request forgery. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title JeecgBoot uploadImgByHttp server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Jeecg Jeecg Boot Jeecgboot
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-25T16:27:44.943Z

Reserved: 2026-02-21T17:34:36.056Z

Link: CVE-2026-2945

cve-icon Vulnrichment

Updated: 2026-02-25T16:27:39.803Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-22T13:16:12.267

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2945

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:45:15Z

Weaknesses