jeecg CVE Vulnerabilities & Metrics

Focus on jeecg vulnerabilities and metrics.

Last updated: 16 Jan 2026, 23:25 UTC

About jeecg Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with jeecg. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total jeecg CVEs: 62
Earliest CVE date: 06 Aug 2021, 23:15 UTC
Latest CVE date: 28 Dec 2025, 08:15 UTC

Latest CVE reference: CVE-2025-15126

Rolling Stats

30-day Count (Rolling): 10
365-day Count (Rolling): 25

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 1150.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 1150.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical jeecg CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.62

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 38
4.0-6.9 20
7.0-8.9 3
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS jeecg CVEs

These are the five CVEs with the highest CVSS scores for jeecg, sorted by severity first and recency.

All CVEs for jeecg

CVE-2025-15126 jeecg vulnerability CVSS: 2.1 28 Dec 2025, 08:15 UTC

A weakness has been identified in JeecgBoot up to 3.9.0. Affected by this vulnerability is the function getPositionUserList of the file /sys/position/getPositionUserList. This manipulation of the argument positionId causes improper authorization. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-15125 jeecg vulnerability CVSS: 2.1 28 Dec 2025, 07:15 UTC

A security flaw has been discovered in JeecgBoot up to 3.9.0. Affected is the function queryDepartPermission of the file /sys/permission/queryDepartPermission. The manipulation of the argument departId results in improper authorization. The attack can be launched remotely. This attack is characterized by high complexity. The exploitability is told to be difficult. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-15124 jeecg vulnerability CVSS: 2.1 28 Dec 2025, 07:15 UTC

A vulnerability was identified in JeecgBoot up to 3.9.0. This impacts the function getParameterMap of the file /sys/sysDepartPermission/list. The manipulation of the argument departId leads to improper authorization. The attack can be initiated remotely. The attack's complexity is rated as high. The exploitability is said to be difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-15123 jeecg vulnerability CVSS: 2.1 28 Dec 2025, 07:15 UTC

A vulnerability was determined in JeecgBoot up to 3.9.0. This affects an unknown function of the file /sys/sysDepartPermission/datarule/. Executing manipulation can lead to improper authorization. It is possible to launch the attack remotely. The attack requires a high level of complexity. The exploitability is reported as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-15122 jeecg vulnerability CVSS: 2.1 28 Dec 2025, 05:16 UTC

A vulnerability was found in JeecgBoot up to 3.9.0. The impacted element is the function loadDatarule of the file /sys/sysDepartRole/datarule/. Performing manipulation of the argument departId/roleId results in improper authorization. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is regarded as difficult. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-15121 jeecg vulnerability CVSS: 2.2 28 Dec 2025, 05:16 UTC

A vulnerability has been found in JeecgBoot up to 3.9.0. The affected element is the function getDeptRoleByUserId of the file /sys/sysDepartRole/getDeptRoleByUserId. Such manipulation of the argument departId leads to information disclosure. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-15120 jeecg vulnerability CVSS: 2.1 28 Dec 2025, 05:15 UTC

A flaw has been found in JeecgBoot up to 3.9.0. Impacted is the function getDeptRoleList of the file /sys/sysDepartRole/getDeptRoleList. This manipulation of the argument departId causes improper authorization. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. The exploitability is considered difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-15119 jeecg vulnerability CVSS: 2.1 28 Dec 2025, 04:16 UTC

A vulnerability was detected in JeecgBoot up to 3.9.0. This issue affects the function queryPageList of the file /sys/sysDepartRole/list. The manipulation of the argument deptId results in improper authorization. The attack can be executed remotely. A high complexity level is associated with this attack. The exploitability is assessed as difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-14909 jeecg vulnerability CVSS: 4.0 19 Dec 2025, 02:16 UTC

A weakness has been identified in JeecgBoot up to 3.9.0. The impacted element is the function SysUserOnlineController of the file jeecg-boot/jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/controller/SysUserOnlineController.java. Executing manipulation can lead to manage user sessions. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. This patch is called b686f9fbd1917edffe5922c6362c817a9361cfbd. Applying a patch is advised to resolve this issue.

CVE-2025-14908 jeecg vulnerability CVSS: 6.5 19 Dec 2025, 01:16 UTC

A security flaw has been discovered in JeecgBoot up to 3.9.0. The affected element is an unknown function of the file jeecg-boot/jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/controller/SysTenantController.java of the component Multi-Tenant Management Module. Performing manipulation of the argument ID results in improper authentication. The attack can be initiated remotely. The exploit has been released to the public and may be exploited. The patch is named e1c8f00bf2a2e0edddbaa8119afe1dc92d9dc1d2/67795493bdc579e489d3ab12e52a1793c4f8a0ee. It is recommended to apply a patch to fix this issue.

CVE-2025-61189 jeecg vulnerability CVSS: 0 01 Oct 2025, 20:18 UTC

Jeecgboot versions 3.8.2 and earlier are affected by a path traversal vulnerability. The endpoint is /sys/comment/addFile. This vulnerability allows attackers to upload files with system-whitelisted extensions to the system directory /opt, instead of the /opt/upFiles directory specified by the web server.

CVE-2025-61188 jeecg vulnerability CVSS: 0 01 Oct 2025, 20:18 UTC

Jeecgboot versions 3.8.2 and earlier are affected by a path traversal vulnerability. This vulnerability allows attackers to upload files with system-whitelisted extensions to the system directory /opt, instead of the /opt/upFiles directory specified by the web server.

CVE-2025-10981 jeecg vulnerability CVSS: 4.0 26 Sep 2025, 00:15 UTC

A vulnerability was detected in JeecgBoot up to 3.8.2. This impacts an unknown function of the file /sys/tenant/exportXls. Performing manipulation results in improper authorization. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-10980 jeecg vulnerability CVSS: 4.0 26 Sep 2025, 00:15 UTC

A security vulnerability has been detected in JeecgBoot up to 3.8.2. This affects an unknown function of the file /sys/position/exportXls. Such manipulation leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-10979 jeecg vulnerability CVSS: 4.0 25 Sep 2025, 23:15 UTC

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-10978 jeecg vulnerability CVSS: 4.0 25 Sep 2025, 23:15 UTC

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-10977 jeecg vulnerability CVSS: 2.1 25 Sep 2025, 23:15 UTC

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-10976 jeecg vulnerability CVSS: 2.1 25 Sep 2025, 22:15 UTC

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-10771 jeecg vulnerability CVSS: 6.5 21 Sep 2025, 23:15 UTC

A vulnerability was determined in jeecgboot JimuReport up to 2.1.2. Affected is an unknown function of the file /drag/onlDragDataSource/testConnection of the component DB2 JDBC Handler. Executing manipulation of the argument clientRerouteServerListJNDIName can lead to deserialization. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

CVE-2025-10770 jeecg vulnerability CVSS: 6.5 21 Sep 2025, 23:15 UTC

A vulnerability was found in jeecgboot JimuReport up to 2.1.2. This impacts an unknown function of the file /drag/onlDragDataSource/testConnection of the component MySQL JDBC Handler. Performing manipulation results in deserialization. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

CVE-2025-10707 jeecg vulnerability CVSS: 6.5 19 Sep 2025, 12:15 UTC

A weakness has been identified in JeecgBoot up to 3.8.2. Affected is an unknown function of the file /message/sysMessageTemplate/sendMsg. Executing manipulation can lead to improper authorization. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-10319 jeecg vulnerability CVSS: 4.0 12 Sep 2025, 15:15 UTC

A security flaw has been discovered in JeecgBoot up to 3.8.2. Affected by this issue is some unknown functionality of the file /sys/tenant/exportLog of the component Tenant Log Export. The manipulation results in improper authorization. The attack can be launched remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-10318 jeecg vulnerability CVSS: 6.5 12 Sep 2025, 13:15 UTC

A vulnerability was identified in JeecgBoot up to 3.8.2. Affected by this vulnerability is an unknown functionality of the file /api/system/sendWebSocketMsg of the component WebSocket Message Handler. The manipulation of the argument userIds leads to improper authorization. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-8963 jeecg vulnerability CVSS: 6.5 14 Aug 2025, 13:15 UTC

A vulnerability was determined in jeecgboot JimuReport up to 2.1.1. Affected by this issue is some unknown functionality of the file /drag/onlDragDataSource/testConnection of the component Data Large Screen Template. The manipulation leads to deserialization. The attack may be launched remotely. The vendor response to the GitHub issue report is: "Modified, next version updated".

CVE-2025-4533 jeecg vulnerability CVSS: 3.3 11 May 2025, 07:15 UTC

A vulnerability classified as problematic was found in JeecgBoot up to 3.8.0. This vulnerability affects the function unzipFile of the file /jeecg-boot/airag/knowledge/doc/import/zip of the component Document Library Upload. The manipulation of the argument File leads to resource consumption. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVE-2024-48307 jeecg vulnerability CVSS: 0 31 Oct 2024, 01:15 UTC

JeecgBoot v3.7.1 was discovered to contain a SQL injection vulnerability via the component /onlDragDatasetHead/getTotalData.

CVE-2024-44893 jeecg vulnerability CVSS: 0 10 Sep 2024, 17:15 UTC

An issue in the component /jeecg-boot/jmreport/dict/list of JimuReport v1.7.8 allows attacker to escalate privileges via a crafted GET request.

CVE-2023-49442 jeecg vulnerability CVSS: 0 03 Jan 2024, 21:15 UTC

Deserialization of Untrusted Data in jeecgFormDemoController in JEECG 4.0 and earlier allows attackers to run arbitrary code via crafted POST request.

CVE-2023-41544 jeecg vulnerability CVSS: 0 30 Dec 2023, 04:15 UTC

SSTI injection vulnerability in jeecg-boot version 3.5.3, allows remote attackers to execute arbitrary code via crafted HTTP request to the /jmreport/loadTableData component.

CVE-2023-41543 jeecg vulnerability CVSS: 0 30 Dec 2023, 02:15 UTC

SQL injection vulnerability in jeecg-boot v3.5.3, allows remote attackers to escalate privileges and obtain sensitive information via the component /sys/replicate/check.

CVE-2023-41542 jeecg vulnerability CVSS: 0 30 Dec 2023, 02:15 UTC

SQL injection vulnerability in jeecg-boot version 3.5.3, allows remote attackers to escalate privileges and obtain sensitive information via the jmreport/qurestSql component.

CVE-2023-6307 jeecg vulnerability CVSS: 6.5 27 Nov 2023, 02:15 UTC

A vulnerability classified as critical was found in jeecgboot JimuReport up to 1.6.1. Affected by this vulnerability is an unknown functionality of the file /download/image. The manipulation of the argument imageUrl leads to relative path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246133 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2023-47467 jeecg vulnerability CVSS: 0 22 Nov 2023, 18:15 UTC

Directory Traversal vulnerability in jeecg-boot v.3.6.0 allows a remote privileged attacker to obtain sensitive information via the file directory structure.

CVE-2023-40989 jeecg vulnerability CVSS: 0 22 Sep 2023, 20:15 UTC

SQL injection vulnerbility in jeecgboot jeecg-boot v 3.0, 3.5.3 that allows a remote attacker to execute arbitrary code via a crafted request to the report/jeecgboot/jmreport/queryFieldBySql component.

CVE-2023-42268 jeecg vulnerability CVSS: 0 08 Sep 2023, 19:15 UTC

Jeecg boot up to v3.5.3 was discovered to contain a SQL injection vulnerability via the component /jeecg-boot/jmreport/show.

CVE-2023-41578 jeecg vulnerability CVSS: 0 08 Sep 2023, 19:15 UTC

Jeecg boot up to v3.5.3 was discovered to contain an arbitrary file read vulnerability via the interface /testConnection.

CVE-2023-4450 jeecg vulnerability CVSS: 6.5 21 Aug 2023, 03:15 UTC

A vulnerability was found in jeecgboot JimuReport up to 1.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Template Handler. The manipulation leads to injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-237571.

CVE-2023-38905 jeecg vulnerability CVSS: 0 17 Aug 2023, 19:15 UTC

SQL injection vulnerability in Jeecg-boot v.3.5.0 and before allows a local attacker to cause a denial of service via the Benchmark, PG_Sleep, DBMS_Lock.Sleep, Waitfor, DECODE, and DBMS_PIPE.RECEIVE_MESSAGE functions.

CVE-2023-38992 jeecg vulnerability CVSS: 0 28 Jul 2023, 15:15 UTC

jeecg-boot v3.5.1 was discovered to contain a SQL injection vulnerability via the title parameter at /sys/dict/loadTreeData.

CVE-2023-34660 jeecg vulnerability CVSS: 0 16 Jun 2023, 18:15 UTC

jjeecg-boot V3.5.0 has an unauthorized arbitrary file upload in /jeecg-boot/jmreport/upload interface.

CVE-2023-34659 jeecg vulnerability CVSS: 0 16 Jun 2023, 18:15 UTC

jeecg-boot 3.5.0 and 3.5.1 have a SQL injection vulnerability the id parameter of the /jeecg-boot/jmreport/show interface.

CVE-2023-1784 jeecg vulnerability CVSS: 5.0 31 Mar 2023, 20:15 UTC

A vulnerability was found in jeecg-boot 3.5.0 and classified as critical. This issue affects some unknown processing of the component API Documentation. The manipulation leads to improper authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224699.

CVE-2023-1741 jeecg vulnerability CVSS: 4.0 30 Mar 2023, 22:15 UTC

A vulnerability was found in jeecg-boot 3.5.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file SysDictMapper.java of the component Sleep Command Handler. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224629 was assigned to this vulnerability.

CVE-2023-1454 jeecg vulnerability CVSS: 6.5 17 Mar 2023, 07:15 UTC

A vulnerability classified as critical has been found in jeecg-boot 3.5.0. This affects an unknown part of the file jmreport/qurestSql. The manipulation of the argument apiSelectId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223299.

CVE-2023-24789 jeecg vulnerability CVSS: 0 06 Mar 2023, 16:15 UTC

jeecg-boot v3.4.4 was discovered to contain an authenticated SQL injection vulnerability via the building block report component.

CVE-2021-37306 jeecg vulnerability CVSS: 0 03 Feb 2023, 18:15 UTC

An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: api uri:/sys/user/checkOnlyUser?username=admin.

CVE-2021-37305 jeecg vulnerability CVSS: 0 03 Feb 2023, 18:15 UTC

An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: /sys/user/querySysUser?username=admin.

CVE-2021-37304 jeecg vulnerability CVSS: 0 03 Feb 2023, 18:15 UTC

An Insecure Permissions issue in jeecg-boot 2.4.5 allows unauthenticated remote attackers to gain escalated privilege and view sensitive information via the httptrace interface.

CVE-2022-47105 jeecg vulnerability CVSS: 0 19 Jan 2023, 16:15 UTC

Jeecg-boot v3.4.4 was discovered to contain a SQL injection vulnerability via the component /sys/dict/queryTableData.

CVE-2022-45210 jeecg vulnerability CVSS: 0 25 Nov 2022, 17:15 UTC

Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/deleteRecycleBin.

CVE-2022-45208 jeecg vulnerability CVSS: 0 25 Nov 2022, 17:15 UTC

Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/putRecycleBin.

CVE-2022-45207 jeecg vulnerability CVSS: 0 25 Nov 2022, 17:15 UTC

Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component updateNullByEmptyString.

CVE-2022-45206 jeecg vulnerability CVSS: 0 25 Nov 2022, 17:15 UTC

Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/duplicate/check.

CVE-2022-45205 jeecg vulnerability CVSS: 0 25 Nov 2022, 17:15 UTC

Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/dict/queryTableData.

CVE-2022-2647 jeecg vulnerability CVSS: 0 04 Aug 2022, 09:15 UTC

A vulnerability was found in jeecg-boot. It has been declared as critical. This vulnerability affects unknown code of the file /api/. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-205594 is the identifier assigned to this vulnerability.

CVE-2021-44585 jeecg vulnerability CVSS: 4.3 10 Mar 2022, 21:15 UTC

A Cross Site Scripting (XSS) vulnerabilitiy exits in jeecg-boot 3.0 in /jeecg-boot/jmreport/view with a mouseover event.

CVE-2022-22881 jeecg vulnerability CVSS: 7.5 16 Feb 2022, 22:15 UTC

Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /sys/user/queryUserComponentData.

CVE-2022-22880 jeecg vulnerability CVSS: 7.5 16 Feb 2022, 22:15 UTC

Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /jeecg-boot/sys/user/queryUserByDepId.

CVE-2021-46089 jeecg vulnerability CVSS: 10.0 25 Jan 2022, 15:15 UTC

In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges.

CVE-2020-20948 jeecg vulnerability CVSS: 5.0 27 Dec 2021, 21:15 UTC

An arbitrary file download vulnerability in jeecg v3.8 allows attackers to access sensitive files via modification of the "localPath" variable.

CVE-2020-28088 jeecg vulnerability CVSS: 7.5 06 Aug 2021, 23:15 UTC

An arbitrary file upload vulnerability in /jeecg-boot/sys/common/upload of jeecg-boot CMS 2.3 allows attackers to execute arbitrary code.

CVE-2020-28087 jeecg vulnerability CVSS: 5.0 06 Aug 2021, 23:15 UTC

A SQL injection vulnerability in /jeecg boot/sys/dict/loadtreedata of jeecg-boot CMS 2.3 allows attackers to access sensitive database information.