Description
A vulnerability was identified in JeecgBoot up to 3.9.1. This affects the function OpenApiController.add/OpenApiController.call of the file OpenApiController.java of the component OpenApi Service. Such manipulation of the argument originUrl database leads to server-side request forgery. It is possible to launch the attack remotely. The exploit is publicly available and might be used. It is suggested to upgrade the affected component. The vendor confirmed the issue and will provide a fix in the upcoming release.
Published: 2026-05-02
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A server‑side request forgery vulnerability exists in the OpenApiController.add and OpenApiController.call functions of JeecgBoot’s OpenApiService. An attacker can manipulate the originUrl argument stored in the database, causing the server to make unintended HTTP requests on the attacker’s behalf. The flaw allows remote exploitation, potentially enabling the attacker to reach internal network resources or external services, compromising confidentiality and integrity without direct code execution.

Affected Systems

JeecgBoot OpenApi Service implementations up to version 3.9.1 are affected. The vulnerability originates in OpenApiController.java and applies to all deployments using the affected component. No later versions are listed as impacted, but the vendor has confirmed the issue and promised a fix in an upcoming release.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, and the EPSS score is not available. The flaw is not catalogued in CISA’s KEV, yet publicly available exploit code has been reported. Because the vulnerability is accessed remotely via the exposed OpenAPI endpoints, an attacker only needs network connectivity to the service to craft malicious originUrl values, making SSRF a realistic threat in environments where the application can reach internal or external hosts.

Generated by OpenCVE AI on May 2, 2026 at 06:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade JeecgBoot to a release that contains the vendor‑supplied SSRF fix.
  • If an immediate upgrade is impossible, implement strict validation of the originUrl parameter in the OpenApiController, rejecting any URLs that are not on an approved whitelist of domains or IP subnets.
  • Configure network segmentation or firewall rules to limit outbound traffic from the application server, blocking internal IP ranges and unnecessary external endpoints to mitigate the impact of a successful SSRF attack.

Generated by OpenCVE AI on May 2, 2026 at 06:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in JeecgBoot up to 3.9.1. This affects the function OpenApiController.add/OpenApiController.call of the file OpenApiController.java of the component OpenApi Service. Such manipulation of the argument originUrl database leads to server-side request forgery. It is possible to launch the attack remotely. The exploit is publicly available and might be used. It is suggested to upgrade the affected component. The vendor confirmed the issue and will provide a fix in the upcoming release.
Title JeecgBoot OpenApi Service OpenApiController.java OpenApiController.call server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-02T04:45:12.477Z

Reserved: 2026-05-01T11:57:55.557Z

Link: CVE-2026-7604

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T05:16:01.767

Modified: 2026-05-02T05:16:01.767

Link: CVE-2026-7604

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T07:00:06Z

Weaknesses