Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10771: Deserialization in jeecgboot JimuReport

0
Medium
VulnerabilityCVE-2025-10771cvecve-2025-10771
Published: Sun Sep 21 2025 (09/21/2025, 23:02:07 UTC)
Source: CVE Database V5
Vendor/Project: jeecgboot
Product: JimuReport

Description

A vulnerability was determined in jeecgboot JimuReport up to 2.1.2. Affected is an unknown function of the file /drag/onlDragDataSource/testConnection of the component DB2 JDBC Handler. Executing manipulation of the argument clientRerouteServerListJNDIName can lead to deserialization. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 09/29/2025, 00:46:57 UTC

Technical Analysis

CVE-2025-10771 is a medium severity vulnerability affecting the jeecgboot JimuReport product, specifically versions 2.1.0 through 2.1.2. The vulnerability exists in an unspecified function within the /drag/onlDragDataSource/testConnection endpoint of the DB2 JDBC Handler component. It involves unsafe deserialization triggered by manipulation of the clientRerouteServerListJNDIName argument. This vulnerability allows an unauthenticated remote attacker to send crafted input that leads to deserialization of untrusted data. Deserialization vulnerabilities can enable attackers to execute arbitrary code, cause denial of service, or manipulate application logic depending on the deserialized objects and the application's handling of them. The CVSS 4.0 vector indicates the attack is network accessible (AV:N), requires low attack complexity (AC:L), no privileges (PR:L - low privileges, but not none), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The exploit has been publicly disclosed but no known exploits in the wild have been reported yet. The vulnerability does not require user interaction but does require low privileges, which suggests some form of authentication or limited access is needed to exploit. The lack of available patches at the time of publication increases risk for affected users. Given the nature of deserialization flaws, the risk includes remote code execution or application compromise if exploited successfully.

Potential Impact

For European organizations using jeecgboot JimuReport versions 2.1.0 to 2.1.2, this vulnerability poses a risk of unauthorized remote code execution or application compromise. This could lead to data breaches, disruption of business intelligence reporting, or lateral movement within internal networks. Organizations relying on JimuReport for critical reporting or data visualization, especially those integrating DB2 databases, may face confidentiality, integrity, and availability impacts. The partial impact ratings suggest that while full system compromise is not guaranteed, attackers could gain significant control or disrupt services. The requirement for low privileges means that internal threat actors or compromised accounts could exploit this vulnerability. The public disclosure of the exploit code increases the risk of opportunistic attacks. European organizations in sectors such as finance, manufacturing, or public administration that use this software for reporting and data analysis could be targeted to gain sensitive insights or disrupt operations.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the /drag/onlDragDataSource/testConnection endpoint to trusted users and networks only, using network segmentation and firewall rules. 2. Implement strict input validation and sanitization on the clientRerouteServerListJNDIName parameter to prevent malicious serialized objects from being processed. 3. Monitor application logs for unusual deserialization attempts or malformed input targeting this endpoint. 4. If possible, disable or isolate the DB2 JDBC Handler component until a patch is available. 5. Apply the principle of least privilege to accounts that can access this functionality, reducing the risk posed by low privilege requirements. 6. Engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 7. Consider deploying runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block deserialization attack patterns. 8. Conduct internal security assessments and penetration tests focusing on deserialization vulnerabilities in JimuReport to identify and remediate related weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-21T08:19:29.004Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d084bbd7d6140a8f93227f

Added to database: 9/21/2025, 11:05:31 PM

Last enriched: 9/29/2025, 12:46:57 AM

Last updated: 11/5/2025, 10:43:57 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats