Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2111: Path Traversal in JeecgBoot

0
Medium
VulnerabilityCVE-2026-2111cvecve-2026-2111
Published: Sat Feb 07 2026 (02/07/2026, 20:32:09 UTC)
Source: CVE Database V5
Product: JeecgBoot

Description

CVE-2026-2111 is a medium-severity path traversal vulnerability in JeecgBoot versions up to 3. 9. 0 affecting the Retrieval-Augmented Generation Module's /airag/knowledge/doc/edit endpoint. An attacker can remotely manipulate the filePath argument to access unauthorized files on the server without authentication or user interaction. Although the CVSS score is 5. 3, indicating medium severity, the vulnerability allows partial confidentiality impact with low complexity and no privileges required. The vendor has not responded to disclosure, and no patches are currently available. European organizations using JeecgBoot, especially in sectors relying on this framework for knowledge management, could face data exposure risks. Mitigations include strict input validation, implementing web application firewalls with path traversal detection, and monitoring access logs for suspicious file access patterns. Countries with higher adoption of Java-based enterprise frameworks and digital transformation initiatives, such as Germany, France, and the UK, are more likely to be affected.

AI-Powered Analysis

AILast updated: 02/07/2026, 20:59:55 UTC

Technical Analysis

CVE-2026-2111 is a path traversal vulnerability identified in JeecgBoot, an open-source low-code development platform widely used for enterprise applications. The vulnerability exists in the Retrieval-Augmented Generation Module, specifically in the /airag/knowledge/doc/edit endpoint, where the filePath parameter is insufficiently sanitized. This allows an unauthenticated remote attacker to manipulate the filePath argument to traverse directories and access arbitrary files on the server's filesystem. The vulnerability affects all versions up to 3.9.0. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and limited confidentiality impact (VC:L) with no impact on integrity or availability. The vendor was contacted but did not respond, and no official patch or mitigation guidance has been released. Public exploit code is available, increasing the risk of exploitation. This vulnerability could lead to unauthorized disclosure of sensitive files, potentially exposing credentials, configuration files, or intellectual property. The lack of authentication requirements and remote exploitability make this a notable risk for organizations deploying JeecgBoot in production environments.

Potential Impact

For European organizations, the primary impact is unauthorized disclosure of sensitive information due to path traversal attacks. This could compromise confidentiality of internal documents, configuration files, or user data stored on affected servers. Organizations in sectors such as finance, healthcare, government, and manufacturing that use JeecgBoot for internal knowledge management or document handling are at heightened risk. Exploitation could facilitate further attacks, including lateral movement or privilege escalation if sensitive credentials or keys are exposed. The medium severity score reflects limited impact on integrity and availability but significant confidentiality concerns. The remote and unauthenticated nature of the exploit increases the attack surface, especially for internet-facing applications. The absence of vendor response and patches means organizations must rely on internal mitigations, increasing operational risk. European data protection regulations (e.g., GDPR) impose strict requirements on data confidentiality, so breaches could also lead to regulatory penalties and reputational damage.

Mitigation Recommendations

1. Implement strict input validation and sanitization on the filePath parameter to prevent directory traversal sequences (e.g., ../). 2. Use allowlists for file paths or restrict file access to specific directories using secure coding practices. 3. Deploy Web Application Firewalls (WAFs) configured to detect and block path traversal attack patterns targeting the /airag/knowledge/doc/edit endpoint. 4. Monitor server and application logs for unusual file access patterns or repeated attempts to access parent directories. 5. Isolate the affected module in a restricted environment with minimal privileges to limit potential damage. 6. If possible, disable or restrict access to the vulnerable module until a patch is available. 7. Conduct internal code reviews and penetration tests focusing on file handling functionalities. 8. Maintain an inventory of JeecgBoot deployments and prioritize patching or mitigation efforts accordingly. 9. Engage with the JeecgBoot community or maintainers for updates or unofficial patches. 10. Educate developers and administrators about secure file handling and path traversal risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T14:30:27.171Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6987a478f9fa50a62fad9688

Added to database: 2/7/2026, 8:45:44 PM

Last enriched: 2/7/2026, 8:59:55 PM

Last updated: 2/7/2026, 9:46:00 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats