Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15123: Improper Authorization in JeecgBoot

0
Low
VulnerabilityCVE-2025-15123cvecve-2025-15123
Published: Sun Dec 28 2025 (12/28/2025, 06:02:05 UTC)
Source: CVE Database V5
Product: JeecgBoot

Description

A vulnerability was determined in JeecgBoot up to 3.9.0. This affects an unknown function of the file /sys/sysDepartPermission/datarule/. Executing manipulation can lead to improper authorization. It is possible to launch the attack remotely. The attack requires a high level of complexity. The exploitability is reported as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:42:36 UTC

Technical Analysis

CVE-2025-15123 is a security vulnerability identified in JeecgBoot, an open-source rapid development platform, affecting all versions up to 3.9.0. The vulnerability resides in an unspecified function within the /sys/sysDepartPermission/datarule/ path, which handles authorization rules related to system department permissions. Due to improper authorization checks, an attacker with some level of privileges (low privileges required) can remotely manipulate authorization data, potentially bypassing intended access controls. The attack vector is network-based with no user interaction needed, but the attack complexity is high, indicating that exploitation requires detailed knowledge of the system and careful crafting of requests. The CVSS 4.0 base score is 2.3, reflecting low severity due to limited impact on confidentiality, integrity, and availability, and the requirement for some privileges. The vendor was notified but has not responded or issued a patch, and no known exploits are currently active in the wild. The vulnerability could allow unauthorized access to certain data or functions if exploited, but the scope and impact are limited by the complexity and privilege requirements.

Potential Impact

For European organizations using JeecgBoot, this vulnerability could lead to unauthorized access or modification of department permission data, potentially allowing privilege escalation or unauthorized data access within the application. However, the low severity and high complexity reduce the likelihood of widespread exploitation. Organizations in sectors with sensitive internal data or strict compliance requirements (e.g., finance, healthcare, government) could face risks if attackers leverage this flaw to bypass internal access controls. The lack of vendor response and patch increases the risk window, especially for organizations that have not implemented compensating controls. The impact on confidentiality, integrity, and availability is limited but could still undermine trust in internal access management and lead to compliance issues under regulations such as GDPR if unauthorized data access occurs.

Mitigation Recommendations

European organizations should immediately audit and tighten access controls around the /sys/sysDepartPermission/datarule/ functionality in JeecgBoot. Implement network-level restrictions to limit access to the affected endpoints only to trusted internal users or systems. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting authorization manipulation. Monitor logs for unusual access patterns or failed authorization attempts related to this endpoint. If feasible, isolate or sandbox the affected components to reduce potential impact. Engage in active threat hunting to detect any attempts to exploit this vulnerability. Maintain up-to-date backups and prepare incident response plans in case exploitation occurs. Since no official patch is available, consider contributing or requesting a fix from the JeecgBoot community or exploring temporary code-level mitigations such as additional authorization checks. Finally, keep abreast of any vendor updates or community patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-27T09:01:03.509Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450bbdb813ff03e2bf824

Added to database: 12/30/2025, 10:22:51 PM

Last enriched: 12/30/2025, 11:42:36 PM

Last updated: 2/2/2026, 8:46:35 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats