Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15119: Improper Authorization in JeecgBoot

0
Low
VulnerabilityCVE-2025-15119cvecve-2025-15119
Published: Sun Dec 28 2025 (12/28/2025, 03:32:06 UTC)
Source: CVE Database V5
Product: JeecgBoot

Description

A vulnerability was detected in JeecgBoot up to 3.9.0. This issue affects the function queryPageList of the file /sys/sysDepartRole/list. The manipulation of the argument deptId results in improper authorization. The attack can be executed remotely. A high complexity level is associated with this attack. The exploitability is assessed as difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:14:39 UTC

Technical Analysis

CVE-2025-15119 is a security vulnerability identified in JeecgBoot, an open-source rapid development platform widely used for enterprise applications. The flaw exists in the queryPageList function within the /sys/sysDepartRole/list endpoint, where the deptId parameter is improperly authorized. This improper authorization allows an attacker with low privileges to manipulate the deptId argument to access or query data beyond their permitted scope. The vulnerability is exploitable remotely without requiring user interaction, but the attack complexity is high, and no authentication bypass occurs; the attacker must have some level of authenticated access (low privileges). The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. Although a public exploit is available, no known active exploitation in the wild has been reported. The vendor was notified early but has not issued a patch or response, leaving users exposed. This vulnerability could lead to unauthorized data disclosure within the affected system, potentially exposing sensitive organizational information. The affected versions range from 3.0 through 3.9.0, covering all recent releases up to the date of disclosure. The lack of vendor response and patch availability increases the risk for organizations relying on JeecgBoot for critical applications.

Potential Impact

For European organizations using JeecgBoot in their enterprise environments, this vulnerability could result in unauthorized access to internal role and department-related data, potentially exposing sensitive organizational structures or user-role mappings. While the impact on confidentiality is limited (low confidentiality impact), unauthorized data access could facilitate further reconnaissance or privilege escalation attempts if combined with other vulnerabilities. The difficulty of exploitation and requirement for low-level privileges reduce the likelihood of widespread exploitation, but targeted attacks against organizations with sensitive data or critical infrastructure could still pose a risk. The absence of vendor patches means organizations must rely on compensating controls, increasing operational risk. Data privacy regulations such as GDPR may be implicated if unauthorized access leads to exposure of personal data, potentially resulting in regulatory penalties. The threat is more relevant to organizations with internal deployments of JeecgBoot, especially those integrating it into HR, access control, or internal management systems.

Mitigation Recommendations

1. Implement strict server-side authorization checks on the deptId parameter and all related API endpoints to ensure users can only access data within their authorized scope. 2. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to manipulate deptId or access /sys/sysDepartRole/list. 3. Monitor logs for unusual access patterns or repeated failed authorization attempts targeting the vulnerable endpoint. 4. Restrict access to the affected API endpoint to trusted networks or VPNs where possible to reduce exposure. 5. Conduct internal code reviews and security testing to identify and remediate similar authorization issues in customizations or integrations. 6. Engage with the JeecgBoot community or maintainers for updates or unofficial patches and consider contributing fixes if feasible. 7. Isolate sensitive data and apply the principle of least privilege in role assignments to limit potential data exposure. 8. Prepare incident response plans to quickly address any detected exploitation attempts. 9. If feasible, consider migrating to alternative platforms or versions not affected by this vulnerability until an official patch is released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-27T09:00:45.393Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b3db813ff03e2beeae

Added to database: 12/30/2025, 10:22:43 PM

Last enriched: 12/30/2025, 11:14:39 PM

Last updated: 2/6/2026, 3:50:59 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats