Description
A vulnerability has been found in erzhongxmu JEEWMS 3.7. Affected by this issue is some unknown functionality of the file /plug-in/ueditor/jsp/getRemoteImage.jsp of the component UEditor. The manipulation of the argument upfile leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-23
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Apply Patch
AI Analysis

Impact

A flaw in the UEditor component of erzhongxmu JEEWMS 3.7 allows an attacker to manipulate the "upfile" parameter in the getRemoteImage.jsp endpoint, causing the server itself to retrieve arbitrary URLs. This server‑side request forgery can lead to the exploitation of internal network resources, data exfiltration, or denial of service against internal services. The vulnerability can be triggered remotely by supplying a crafted request to the affected endpoint.

Affected Systems

The vulnerability is limited to erzhongxmu JEEWMS version 3.7, specifically the /plug‑in/ueditor/jsp/getRemoteImage.jsp functionality of the UEditor module. No other versions or components are listed as affected.

Risk and Exploitability

The CVSS v3 score of 6.9 rates this issue as Moderate, with an EPSS probability of less than 1%. It is not listed in the CISA KEV catalog. The attack vector is remote, using an HTTP request to the vulnerable endpoint. Exploitation requires the ability to send arbitrary URLs in the "upfile" parameter, and the attacker benefits from the server’s outbound network connectivity; no local privilege escalation is required, and the scope is confined to the target system’s network resources.

Generated by OpenCVE AI on April 18, 2026 at 11:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Limit inbound traffic to the /plug‑in/ueditor/jsp/getRemoteImage.jsp endpoint by applying firewall rules or network segmentation.
  • Disable or remove the UEditor module in JEEWMS or restrict the upfile parameter handling to allow only safe protocols (e.g., http/https to known hosts).
  • Apply any vendor‑supplied patch or upgrade to a newer JEEWMS version once the vendor releases a fix; if no patch exists, consider removing the vulnerable module entirely.

Generated by OpenCVE AI on April 18, 2026 at 11:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Erzhongxmu
Erzhongxmu jeewms
Vendors & Products Erzhongxmu
Erzhongxmu jeewms

Mon, 23 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in erzhongxmu JEEWMS 3.7. Affected by this issue is some unknown functionality of the file /plug-in/ueditor/jsp/getRemoteImage.jsp of the component UEditor. The manipulation of the argument upfile leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title erzhongxmu JEEWMS UEditor getRemoteImage.jsp server-side request forgery
First Time appeared Jeewms
Jeewms jeewms
Weaknesses CWE-918
CPEs cpe:2.3:a:jeewms:jeewms:*:*:*:*:*:*:*:*
Vendors & Products Jeewms
Jeewms jeewms
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-25T15:04:59.828Z

Reserved: 2026-02-23T14:05:13.898Z

Link: CVE-2026-3026

cve-icon Vulnrichment

Updated: 2026-02-25T15:04:53.866Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-23T21:19:12.713

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3026

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:15:35Z

Weaknesses