Description
A vulnerability was found in erzhongxmu JEEWMS up to 3.7. This affects an unknown part of the file src/main/webapp/plug-in/ueditor/jsp/getContent.jsp of the component UEditor. The manipulation of the argument myEditor results in cross site scripting. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross Site Scripting
Action: Patch
AI Analysis

Impact

The vulnerability resides in the UEditor component of erzhongxmu JEEWMS, specifically the getContent.jsp script. An attacker can manipulate the myEditor argument supplied to this endpoint, which results in reflected cross site scripting. The flaw is a classic example of CWE‑79, with a secondary indication of CWE‑94 suggesting potential code evaluation issues. If an attacker injects malicious JavaScript, it will execute in the context of any user who visits the affected page.

Affected Systems

Vendors erzhongxmu and product JEEWMS are impacted. The flaw exists in all releases up to and including version 3.7. No specific sub‑versions are listed, so any installation of JEEWMS 3.7 or earlier should be considered vulnerable.

Risk and Exploitability

The CVSS score of 5.3 places the risk in the moderate range, and the EPSS score of less than 1 % indicates a low probability of exploitation in the current landscape, though it is not zero. The vulnerability is not listed in the CISA KEV catalog. The exploit can be launched remotely through a crafted request to the getContent.jsp URL, with no authentication required. The likely attack vector is a reflected XSS delivered via the myEditor parameter to a victim’s browser. Once the script runs, an attacker could perform actions such as session hijacking, defacement, or phishing, depending on the privileges of the victim.

Generated by OpenCVE AI on April 17, 2026 at 16:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update JEEWMS to the latest available release or apply the vendor supplied patch once it becomes available
  • If an update is unavailable, modify or disable the UEditor component, ensuring that the myEditor parameter is properly sanitized or filtered to prevent injection of arbitrary scripts
  • Implement web application firewall rules or CSP headers to detect and block reflected XSS payloads in outgoing responses
  • Regularly scan and monitor web traffic for anomalous requests containing script markers or HTML injection patterns

Generated by OpenCVE AI on April 17, 2026 at 16:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in erzhongxmu JEEWMS up to 3.7. This affects an unknown part of the file src/main/webapp/plug-in/ueditor/jsp/getContent.jsp of the component UEditor. The manipulation of the argument myEditor results in cross site scripting. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title erzhongxmu JEEWMS UEditor getContent.jsp cross site scripting
First Time appeared Jeewms
Jeewms jeewms
Weaknesses CWE-79
CWE-94
CPEs cpe:2.3:a:jeewms:jeewms:*:*:*:*:*:*:*:*
Vendors & Products Jeewms
Jeewms jeewms
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-25T15:19:05.163Z

Reserved: 2026-02-23T14:05:20.948Z

Link: CVE-2026-3027

cve-icon Vulnrichment

Updated: 2026-02-25T15:18:56.422Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-23T21:19:12.920

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3027

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:15:22Z

Weaknesses