Impact
JeecgBoot 3.9.0 and 3.9.1 contain a function in JeecgBizToolsProvider.java that lacks proper authentication checks, allowing a remote request to execute the AI Chat module without identity verification. This flaw permits an attacker to invoke the module’s exposed functionality unimpeded, potentially accessing or manipulating data and leveraging the AI service for malicious purposes. The vulnerability is classified under CWE-287 (Improper Authentication) and CWE-306 (Missing Authentication for Critical Function).
Affected Systems
The issue affects the JeecgBoot framework, specifically the AI Chat component under org.jeecg.modules.airag. Versions 3.9.0 and 3.9.1 are vulnerable. Deployments that have not yet incorporated the corrective commit are at risk.
Risk and Exploitability
With a CVSS score of 6.9, the vulnerability presents moderate severity. Although EPSS is not available, the remote nature of the attack vector suggests a plausible exploitation scenario. The vulnerability is not listed in the CISA KEV catalog, but without authentication controls, malicious actors could exploit the exposed API from anywhere on the network or the Internet if network exposure exists. Prompt remediation is advised to mitigate the risk of unauthorized data access or manipulation.
OpenCVE Enrichment