Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10977: Improper Authorization in JeecgBoot

0
Low
VulnerabilityCVE-2025-10977cvecve-2025-10977
Published: Thu Sep 25 2025 (09/25/2025, 22:32:08 UTC)
Source: CVE Database V5
Product: JeecgBoot

Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/03/2025, 00:44:36 UTC

Technical Analysis

CVE-2025-10977 is a security vulnerability identified in JeecgBoot versions up to 3.8.2. The issue lies in an improper authorization mechanism within the /sys/tenant/deleteBatch endpoint. Specifically, the vulnerability arises from the manipulation of the 'ids' argument, which allows an attacker to bypass intended authorization checks. This flaw enables unauthorized remote actors to potentially delete tenant records in batch, which could disrupt multi-tenant environments or compromise data integrity. The attack complexity is rated as high, indicating that exploitation requires significant effort or specific conditions. Additionally, the exploitability is considered difficult, and no user interaction or authentication is required, but the attacker must have some level of privileges (low privileges) to attempt the exploit. The vulnerability has a low CVSS 4.0 score of 2.3, reflecting limited impact and difficulty in exploitation. The vendor has not responded to early disclosure attempts, and no patches or mitigations have been officially released. The exploit code is publicly available, increasing the risk of opportunistic attacks despite the low severity rating. This vulnerability affects the integrity of the system by allowing unauthorized deletion of tenant data, which could lead to service disruption or data loss in affected deployments.

Potential Impact

For European organizations utilizing JeecgBoot, particularly those operating multi-tenant applications or services, this vulnerability could lead to unauthorized deletion of tenant data, impacting data integrity and availability. Although the CVSS score is low, the presence of publicly available exploit code increases the risk of exploitation attempts. Organizations with sensitive or critical tenant data could face operational disruptions, potential data loss, and reputational damage if attackers leverage this vulnerability. The difficulty of exploitation and requirement for some privilege level reduces the likelihood of widespread attacks but does not eliminate the risk, especially in environments where internal threat actors or compromised accounts exist. Given the lack of vendor response and patches, European entities must proactively assess their exposure and implement compensating controls to mitigate potential impacts.

Mitigation Recommendations

1. Conduct a thorough audit of all JeecgBoot instances to identify affected versions (3.8.0, 3.8.1, 3.8.2) and isolate them for immediate review. 2. Implement strict access controls and monitoring on the /sys/tenant/deleteBatch endpoint to detect and block unauthorized requests, including rate limiting and anomaly detection. 3. Restrict privileges to the minimum necessary for users and services interacting with tenant deletion functionality to reduce the risk of privilege abuse. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and prevent manipulation of the 'ids' parameter in deleteBatch requests. 5. If possible, disable or restrict the deleteBatch API endpoint until a vendor patch or official fix is released. 6. Monitor logs for suspicious activity related to tenant deletion operations and establish alerting mechanisms for unusual patterns. 7. Engage in network segmentation to limit exposure of JeecgBoot management interfaces to trusted internal networks only. 8. Prepare incident response plans specific to unauthorized data deletion scenarios to minimize downtime and data loss. 9. Stay updated with vendor communications and community advisories for any forthcoming patches or mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-25T14:20:56.882Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d5c33eadeba2ac3e9e5f09

Added to database: 9/25/2025, 10:33:34 PM

Last enriched: 10/3/2025, 12:44:36 AM

Last updated: 11/10/2025, 4:19:27 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats