CVE-2025-15119: Improper Authorization in JeecgBoot
A vulnerability was detected in JeecgBoot up to 3.9.0. This issue affects the function queryPageList of the file /sys/sysDepartRole/list. The manipulation of the argument deptId results in improper authorization. The attack can be executed remotely. A high complexity level is associated with this attack. The exploitability is assessed as difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-15119 is a security vulnerability identified in JeecgBoot, an open-source rapid development platform widely used for enterprise applications. The flaw exists in the queryPageList function within the /sys/sysDepartRole/list endpoint, where the deptId parameter is improperly authorized. This improper authorization allows an attacker with low privileges to manipulate the deptId argument to access or query data beyond their permitted scope. The vulnerability is exploitable remotely without requiring user interaction, but the attack complexity is high, and no authentication bypass occurs; the attacker must have some level of authenticated access (low privileges). The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. Although a public exploit is available, no known active exploitation in the wild has been reported. The vendor was notified early but has not issued a patch or response, leaving users exposed. This vulnerability could lead to unauthorized data disclosure within the affected system, potentially exposing sensitive organizational information. The affected versions range from 3.0 through 3.9.0, covering all recent releases up to the date of disclosure. The lack of vendor response and patch availability increases the risk for organizations relying on JeecgBoot for critical applications.
Potential Impact
For European organizations using JeecgBoot in their enterprise environments, this vulnerability could result in unauthorized access to internal role and department-related data, potentially exposing sensitive organizational structures or user-role mappings. While the impact on confidentiality is limited (low confidentiality impact), unauthorized data access could facilitate further reconnaissance or privilege escalation attempts if combined with other vulnerabilities. The difficulty of exploitation and requirement for low-level privileges reduce the likelihood of widespread exploitation, but targeted attacks against organizations with sensitive data or critical infrastructure could still pose a risk. The absence of vendor patches means organizations must rely on compensating controls, increasing operational risk. Data privacy regulations such as GDPR may be implicated if unauthorized access leads to exposure of personal data, potentially resulting in regulatory penalties. The threat is more relevant to organizations with internal deployments of JeecgBoot, especially those integrating it into HR, access control, or internal management systems.
Mitigation Recommendations
1. Implement strict server-side authorization checks on the deptId parameter and all related API endpoints to ensure users can only access data within their authorized scope. 2. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to manipulate deptId or access /sys/sysDepartRole/list. 3. Monitor logs for unusual access patterns or repeated failed authorization attempts targeting the vulnerable endpoint. 4. Restrict access to the affected API endpoint to trusted networks or VPNs where possible to reduce exposure. 5. Conduct internal code reviews and security testing to identify and remediate similar authorization issues in customizations or integrations. 6. Engage with the JeecgBoot community or maintainers for updates or unofficial patches and consider contributing fixes if feasible. 7. Isolate sensitive data and apply the principle of least privilege in role assignments to limit potential data exposure. 8. Prepare incident response plans to quickly address any detected exploitation attempts. 9. If feasible, consider migrating to alternative platforms or versions not affected by this vulnerability until an official patch is released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-15119: Improper Authorization in JeecgBoot
Description
A vulnerability was detected in JeecgBoot up to 3.9.0. This issue affects the function queryPageList of the file /sys/sysDepartRole/list. The manipulation of the argument deptId results in improper authorization. The attack can be executed remotely. A high complexity level is associated with this attack. The exploitability is assessed as difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-15119 is a security vulnerability identified in JeecgBoot, an open-source rapid development platform widely used for enterprise applications. The flaw exists in the queryPageList function within the /sys/sysDepartRole/list endpoint, where the deptId parameter is improperly authorized. This improper authorization allows an attacker with low privileges to manipulate the deptId argument to access or query data beyond their permitted scope. The vulnerability is exploitable remotely without requiring user interaction, but the attack complexity is high, and no authentication bypass occurs; the attacker must have some level of authenticated access (low privileges). The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. Although a public exploit is available, no known active exploitation in the wild has been reported. The vendor was notified early but has not issued a patch or response, leaving users exposed. This vulnerability could lead to unauthorized data disclosure within the affected system, potentially exposing sensitive organizational information. The affected versions range from 3.0 through 3.9.0, covering all recent releases up to the date of disclosure. The lack of vendor response and patch availability increases the risk for organizations relying on JeecgBoot for critical applications.
Potential Impact
For European organizations using JeecgBoot in their enterprise environments, this vulnerability could result in unauthorized access to internal role and department-related data, potentially exposing sensitive organizational structures or user-role mappings. While the impact on confidentiality is limited (low confidentiality impact), unauthorized data access could facilitate further reconnaissance or privilege escalation attempts if combined with other vulnerabilities. The difficulty of exploitation and requirement for low-level privileges reduce the likelihood of widespread exploitation, but targeted attacks against organizations with sensitive data or critical infrastructure could still pose a risk. The absence of vendor patches means organizations must rely on compensating controls, increasing operational risk. Data privacy regulations such as GDPR may be implicated if unauthorized access leads to exposure of personal data, potentially resulting in regulatory penalties. The threat is more relevant to organizations with internal deployments of JeecgBoot, especially those integrating it into HR, access control, or internal management systems.
Mitigation Recommendations
1. Implement strict server-side authorization checks on the deptId parameter and all related API endpoints to ensure users can only access data within their authorized scope. 2. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to manipulate deptId or access /sys/sysDepartRole/list. 3. Monitor logs for unusual access patterns or repeated failed authorization attempts targeting the vulnerable endpoint. 4. Restrict access to the affected API endpoint to trusted networks or VPNs where possible to reduce exposure. 5. Conduct internal code reviews and security testing to identify and remediate similar authorization issues in customizations or integrations. 6. Engage with the JeecgBoot community or maintainers for updates or unofficial patches and consider contributing fixes if feasible. 7. Isolate sensitive data and apply the principle of least privilege in role assignments to limit potential data exposure. 8. Prepare incident response plans to quickly address any detected exploitation attempts. 9. If feasible, consider migrating to alternative platforms or versions not affected by this vulnerability until an official patch is released.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-27T09:00:45.393Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450b3db813ff03e2beeae
Added to database: 12/30/2025, 10:22:43 PM
Last enriched: 12/30/2025, 11:14:39 PM
Last updated: 2/6/2026, 3:50:59 PM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2057: SQL Injection in SourceCodester Medical Center Portal Management System
MediumCVE-2024-36597: n/a
HighCVE-2024-32256: n/a
HighCVE-2024-36599: n/a
MediumCVE-2026-2056: Information Disclosure in D-Link DIR-605L
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.