Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15122: Improper Authorization in JeecgBoot

0
Low
VulnerabilityCVE-2025-15122cvecve-2025-15122
Published: Sun Dec 28 2025 (12/28/2025, 05:02:05 UTC)
Source: CVE Database V5
Product: JeecgBoot

Description

A vulnerability was found in JeecgBoot up to 3.9.0. The impacted element is the function loadDatarule of the file /sys/sysDepartRole/datarule/. Performing manipulation of the argument departId/roleId results in improper authorization. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is regarded as difficult. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:34:26 UTC

Technical Analysis

CVE-2025-15122 is a security vulnerability identified in JeecgBoot, an open-source rapid development platform widely used for enterprise applications. The vulnerability resides in the loadDatarule function within the /sys/sysDepartRole/datarule/ path, where improper authorization checks allow an attacker to manipulate the departId and roleId parameters. This manipulation can bypass intended access controls, potentially granting unauthorized access to data or functionality tied to specific departments or roles. The vulnerability is remotely exploitable without user interaction, but requires low privileges and has a high attack complexity, making exploitation challenging. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality (VC:L), with no impact on integrity or availability. Despite the existence of a public exploit, no known active exploitation in the wild has been reported. The vendor has not issued any patches or responded to the disclosure, leaving affected versions 3.0 through 3.9.0 vulnerable. This vulnerability could allow attackers to gain unauthorized access to sensitive data or perform unauthorized actions within the application context, depending on the role and department data accessed. Given the lack of vendor response, organizations must rely on detection and mitigation strategies until official patches are released.

Potential Impact

For European organizations using JeecgBoot, this vulnerability poses a risk of unauthorized access to sensitive departmental or role-based data, potentially leading to data leakage or privilege escalation within the application. Although the impact on confidentiality is low and integrity and availability are unaffected, unauthorized data access could violate data protection regulations such as GDPR if personal or sensitive information is exposed. The high complexity and low exploitability reduce the likelihood of widespread attacks, but targeted attackers with some level of access could exploit this flaw to gain unauthorized insights or perform unauthorized operations. The absence of vendor patches increases the risk exposure duration. Organizations in sectors with strict compliance requirements or handling sensitive data should be particularly cautious. The risk is compounded if JeecgBoot is integrated into critical business processes or internal management systems, where unauthorized access could disrupt operations or lead to reputational damage.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement compensating controls to mitigate the risk. These include: 1) Restrict network access to the affected endpoints by implementing strict firewall rules and network segmentation to limit exposure to trusted users only. 2) Enforce strong authentication and authorization policies at the application and infrastructure levels to reduce the risk of low-privilege attackers exploiting the vulnerability. 3) Monitor and log access to the /sys/sysDepartRole/datarule/ endpoint for unusual or unauthorized parameter manipulations, enabling early detection of exploitation attempts. 4) Conduct code reviews and consider implementing custom authorization checks or input validation on departId and roleId parameters as an interim fix. 5) Educate development and security teams about this vulnerability to raise awareness and prepare for patch deployment once available. 6) Engage with the JeecgBoot community or maintainers to track updates and advocate for timely patch releases. 7) Consider isolating or limiting the use of affected JeecgBoot versions in sensitive environments until a fix is released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-27T09:01:00.591Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b8db813ff03e2bf3b2

Added to database: 12/30/2025, 10:22:48 PM

Last enriched: 12/30/2025, 11:34:26 PM

Last updated: 2/7/2026, 1:15:59 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats