Browse all 7 CVE security advisories affecting jeecgboot. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Jeecgboot is a low-code development platform primarily used for building enterprise applications. Historically, it has been vulnerable to multiple security issues including remote code execution (RCE), cross-site scripting (XSS), and privilege escalation vulnerabilities. The platform's CVE history shows consistent patterns of authentication bypass flaws and insufficient input validation. Jeecgboot has faced several critical security incidents, with its most recent vulnerabilities involving unsafe deserialization and improper access controls. Despite these issues, the platform remains popular in enterprise environments due to its rapid development capabilities, though organizations should implement strict security controls when deploying it.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-5848 | jeecgboot JimuReport Data Source testConnection DriverManager.getConnection code injection — JimuReportCWE-94 | 4.7 | Medium | 2026-04-09 |
| CVE-2025-10771 | jeecgboot JimuReport DB2 JDBC testConnection deserialization — JimuReportCWE-502 | 6.3 | Medium | 2025-09-21 |
| CVE-2025-10770 | jeecgboot JimuReport MySQL JDBC testConnection deserialization — JimuReportCWE-502 | 6.3 | Medium | 2025-09-21 |
| CVE-2025-8963 | jeecgboot JimuReport Data Large Screen Template testConnection deserialization — JimuReportCWE-502 | 6.3 | Medium | 2025-08-14 |
| CVE-2023-6307 | jeecgboot JimuReport image path traversal — JimuReportCWE-23 | 6.3 | Medium | 2023-11-27 |
| CVE-2023-4450 | jeecgboot JimuReport Template injection — JimuReportCWE-74 | 6.3 | Medium | 2023-08-21 |
This page lists every published CVE security advisory associated with jeecgboot. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.