Description
A security flaw has been discovered in JeecgBoot up to 3.9.1. This vulnerability affects the function CommonController.uploadImgByHttp/HttpFileToMultipartFileUtil.httpFileToMultipartFile/HttpFileToMultipartFileUtil.downloadImageData of the file CommonController.java of the component uploadImgByHttpEndpoint. Performing a manipulation results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Upgrading the affected component is recommended. The vendor confirmed the issue and will provide a fix in the upcoming release.
Published: 2026-05-02
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw resides in the file upload handling routine of JeecgBoot’s CommonController, allowing an attacker to craft a request that forces the server to make an outbound HTTP call to a target of the attacker’s choosing. This server‑side request forgery can be used to reach internal services, exfiltrate data, or pivot into further attacks. The vulnerability is identified as CWE‑918, reflecting the improper validation of user‑controlled HTTP URLs.

Affected Systems

JeecgBoot applications running versions up to and including 3.9.1 are affected. No other product versions are listed as impacted, and the vendor labels the issue specifically against the uploadImgByHttpEndpoint component.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity. While an EPSS score is not provided, the public release of the exploit suggests that the vulnerability could be used in real‑world attacks. It is not currently listed in the CISA KEV catalog. Because the vulnerability can be triggered from a remote network location without authentication, any exposed instance of the affected JeecgBoot deployment is at risk. Exploitation requires only forming a special HTTP request containing a malicious URL; no privileged host access is needed.

Generated by OpenCVE AI on May 2, 2026 at 09:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade JeecgBoot to a version beyond 3.9.1 once the vendor’s fix is made available
  • If the patch is not yet released, limit the exposure of the uploadImgByHttpEndpoint by blocking incoming traffic to that endpoint from untrusted networks or by implementing a firewall rule that permits only known, whitelisted external hosts
  • Disable outbound HTTP requests from the application server if possible, or enforce strict URL validation and allow‑list checks on all outgoing connections
  • Apply the vendor‑issued temporary workaround from the issue discussion once verified to mitigate until a permanent update is applied

Generated by OpenCVE AI on May 2, 2026 at 09:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 06:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in JeecgBoot up to 3.9.1. This vulnerability affects the function CommonController.uploadImgByHttp/HttpFileToMultipartFileUtil.httpFileToMultipartFile/HttpFileToMultipartFileUtil.downloadImageData of the file CommonController.java of the component uploadImgByHttpEndpoint. Performing a manipulation results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Upgrading the affected component is recommended. The vendor confirmed the issue and will provide a fix in the upcoming release.
Title JeecgBoot uploadImgByHttpEndpoint CommonController.java HttpFileToMultipartFileUtil.downloadImageData server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-02T06:15:12.060Z

Reserved: 2026-05-01T11:57:59.036Z

Link: CVE-2026-7605

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T07:16:20.973

Modified: 2026-05-02T07:16:20.973

Link: CVE-2026-7605

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T10:00:06Z

Weaknesses