Impact
The vulnerability is a use‑of‑a‑malicious‑condition attack that lets an unauthenticated remote user send crafted data to the /sys/dict/loadTreeData endpoint of the JeecgBoot JSON Object Handler. By manipulating the condition parameter, the attacker can inject SQL code. If successful, the attacker could query, modify or delete database content, potentially leaking confidential data or corrupting system integrity.
Affected Systems
JeecgBoot installations running up to and including version 3.9.1 are affected. The vulnerability resides in the JSON Object Handler component; no other products or vendors are listed.
Risk and Exploitability
The CVSS score of 5.3 places the issue in the medium severity range. The EPSS score is not provided, and the vulnerability is not listed in the CISA KEV catalog, but public exploit code exists. Because the attack vector is remote and the authentication requirement is absent, the risk is realistic for exposed deployments. Successful exploitation would lead to unauthorized database access.
OpenCVE Enrichment