Skip to main content

CVE-2025-10770: Deserialization in jeecgboot JimuReport

Medium
VulnerabilityCVE-2025-10770cvecve-2025-10770
Published: Sun Sep 21 2025 (09/21/2025, 22:32:06 UTC)
Source: CVE Database V5
Vendor/Project: jeecgboot
Product: JimuReport

Description

A vulnerability was found in jeecgboot JimuReport up to 2.1.2. This impacts an unknown function of the file /drag/onlDragDataSource/testConnection of the component MySQL JDBC Handler. Performing manipulation results in deserialization. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 09/21/2025, 22:39:24 UTC

Technical Analysis

CVE-2025-10770 is a medium severity deserialization vulnerability affecting the jeecgboot JimuReport product versions up to 2.1.2. The vulnerability resides in an unspecified function within the /drag/onlDragDataSource/testConnection endpoint of the MySQL JDBC Handler component. Deserialization vulnerabilities occur when untrusted data is processed by an application in a way that allows attackers to manipulate serialized objects, potentially leading to arbitrary code execution, data tampering, or denial of service. In this case, the vulnerability allows remote attackers to send crafted payloads to the vulnerable endpoint, triggering unsafe deserialization without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS score of 5.3 reflects a medium severity, considering the attack complexity is low but requires some privileges (PR:L). The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L/VI:L/VA:L). Although no known exploits are reported in the wild yet, public exploit code is available, increasing the risk of exploitation. The lack of a patch link suggests that a fix may not yet be released or publicly documented. Organizations using affected versions of JimuReport should consider this vulnerability a credible threat due to its remote exploitability and potential impact on database connectivity and reporting functionalities.

Potential Impact

For European organizations, the exploitation of this vulnerability could lead to unauthorized access or manipulation of reporting data, potentially compromising business intelligence, decision-making processes, and data integrity. Since JimuReport integrates with MySQL databases, attackers could leverage this flaw to disrupt data source connections, causing denial of service or injecting malicious payloads that affect downstream systems. This could be particularly damaging for sectors relying heavily on accurate and timely reporting, such as finance, healthcare, and government agencies. The medium severity indicates that while the impact is not catastrophic, it could still result in significant operational disruptions and data breaches if exploited. The remote nature of the attack vector means that attackers do not need physical or local access, increasing the risk for organizations with exposed or poorly segmented network environments.

Mitigation Recommendations

European organizations should immediately audit their use of jeecgboot JimuReport to identify affected versions (2.1.0 through 2.1.2). Until an official patch is available, organizations should implement network-level controls to restrict access to the /drag/onlDragDataSource/testConnection endpoint, such as firewall rules or web application firewall (WAF) policies that detect and block suspicious deserialization payloads. Enforce strict input validation and sanitization on all data received by the application, especially inputs related to database connectivity. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to monitor for anomalous behavior indicative of exploitation attempts. Additionally, review and minimize privileges for the application user accounts interacting with the MySQL database to limit potential damage. Organizations should also monitor threat intelligence feeds for updates on exploit availability and patches, and plan for rapid deployment of official fixes once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-21T08:19:20.108Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d07e84d222ba3d60fe0b1a

Added to database: 9/21/2025, 10:39:00 PM

Last enriched: 9/21/2025, 10:39:24 PM

Last updated: 9/22/2025, 12:16:03 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats