Impact
The vulnerability resides in the isExistSqlInjectKeyword function of the /jeecg-boot/sys/api/getDictItems endpoint. It allows attackers to inject arbitrary SQL statements, potentially leading to unauthorized data access, modification, or deletion. The flaw is a classic SQL injection that can be exploited over the network, affecting confidentiality, integrity, and availability of the underlying database.
Affected Systems
The issue affects the JeecgBoot platform up to and including version 3.9.1. No later versions are mentioned in the data. The affected component is the getDictItems API in JeecgBoot.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. The EPSS figure of less than 1% suggests a very low probability of exploitation at this time. It is not listed in CISA's KEV catalog. Attackers could exploit the vulnerability remotely by sending crafted requests to the getDictItems endpoint, but no exploitation prerequisites beyond network access are described. The risk is moderate but the low exploitation likelihood reduces immediate urgency.
OpenCVE Enrichment