CVE-2026-2945: Server-Side Request Forgery in JeecgBoot
CVE-2026-2945 is a server-side request forgery (SSRF) vulnerability found in JeecgBoot version 3. 9. 0, specifically in the /sys/common/uploadImgByHttp endpoint. An attacker can manipulate the fileUrl parameter to make the server send unauthorized requests to internal or external resources. This vulnerability can be exploited remotely without authentication or user interaction. Although the vendor was notified, no patch or response has been provided. The CVSS 4. 0 base score is 5. 3, indicating medium severity. Exploits have been publicly disclosed but no confirmed in-the-wild attacks are reported.
AI Analysis
Technical Summary
CVE-2026-2945 is a server-side request forgery vulnerability affecting JeecgBoot version 3.9.0, a rapid development platform for enterprise applications. The vulnerability exists in an unspecified functionality related to the /sys/common/uploadImgByHttp endpoint, where the fileUrl parameter is improperly validated or sanitized. An attacker can craft malicious requests that cause the server to initiate HTTP requests to arbitrary URLs, potentially accessing internal network resources or external systems. SSRF vulnerabilities can be leveraged to bypass firewall restrictions, scan internal networks, access sensitive metadata services, or exploit other internal services not directly exposed to the internet. The vulnerability requires no authentication or user interaction, increasing its risk profile. The vendor was contacted but has not issued a patch or advisory, and a public exploit is available, raising the urgency for mitigation. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability individually but combined can lead to significant risk. No known exploits in the wild have been confirmed yet, but public exploit availability increases the likelihood of future attacks.
Potential Impact
The SSRF vulnerability in JeecgBoot 3.9.0 can allow attackers to perform unauthorized requests from the vulnerable server, potentially exposing internal services, sensitive data, or cloud metadata endpoints. This can lead to information disclosure, internal network reconnaissance, and possibly pivoting to further attacks such as remote code execution if chained with other vulnerabilities. Organizations using JeecgBoot in enterprise environments may face increased risk of data breaches or service disruptions. The lack of vendor response and patch increases exposure time, making timely mitigation critical. The medium CVSS score reflects moderate direct impact but significant potential for exploitation in complex attack scenarios. The vulnerability affects confidentiality and integrity primarily, with limited direct availability impact. The ease of exploitation and remote attack vector make it a notable threat for organizations relying on JeecgBoot 3.9.0 for web applications.
Mitigation Recommendations
Since no official patch is available, organizations should implement immediate mitigations such as input validation and sanitization on the fileUrl parameter to restrict allowed URLs to trusted domains or IP ranges. Employ network-level controls like egress filtering and firewall rules to prevent the server from making unauthorized outbound requests, especially to internal or sensitive network segments. Use web application firewalls (WAFs) to detect and block suspicious SSRF attack patterns targeting the vulnerable endpoint. Monitor logs for unusual outbound HTTP requests originating from the application server. Consider isolating the application environment to limit the impact of potential SSRF exploitation. Engage with the JeecgBoot community or maintainers for updates and patches. Where feasible, upgrade to a later, unaffected version once available. Conduct penetration testing focused on SSRF vectors to validate mitigations.
Affected Countries
China, United States, India, Germany, United Kingdom, Japan, South Korea, Brazil, France, Australia
CVE-2026-2945: Server-Side Request Forgery in JeecgBoot
Description
CVE-2026-2945 is a server-side request forgery (SSRF) vulnerability found in JeecgBoot version 3. 9. 0, specifically in the /sys/common/uploadImgByHttp endpoint. An attacker can manipulate the fileUrl parameter to make the server send unauthorized requests to internal or external resources. This vulnerability can be exploited remotely without authentication or user interaction. Although the vendor was notified, no patch or response has been provided. The CVSS 4. 0 base score is 5. 3, indicating medium severity. Exploits have been publicly disclosed but no confirmed in-the-wild attacks are reported.
AI-Powered Analysis
Technical Analysis
CVE-2026-2945 is a server-side request forgery vulnerability affecting JeecgBoot version 3.9.0, a rapid development platform for enterprise applications. The vulnerability exists in an unspecified functionality related to the /sys/common/uploadImgByHttp endpoint, where the fileUrl parameter is improperly validated or sanitized. An attacker can craft malicious requests that cause the server to initiate HTTP requests to arbitrary URLs, potentially accessing internal network resources or external systems. SSRF vulnerabilities can be leveraged to bypass firewall restrictions, scan internal networks, access sensitive metadata services, or exploit other internal services not directly exposed to the internet. The vulnerability requires no authentication or user interaction, increasing its risk profile. The vendor was contacted but has not issued a patch or advisory, and a public exploit is available, raising the urgency for mitigation. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability individually but combined can lead to significant risk. No known exploits in the wild have been confirmed yet, but public exploit availability increases the likelihood of future attacks.
Potential Impact
The SSRF vulnerability in JeecgBoot 3.9.0 can allow attackers to perform unauthorized requests from the vulnerable server, potentially exposing internal services, sensitive data, or cloud metadata endpoints. This can lead to information disclosure, internal network reconnaissance, and possibly pivoting to further attacks such as remote code execution if chained with other vulnerabilities. Organizations using JeecgBoot in enterprise environments may face increased risk of data breaches or service disruptions. The lack of vendor response and patch increases exposure time, making timely mitigation critical. The medium CVSS score reflects moderate direct impact but significant potential for exploitation in complex attack scenarios. The vulnerability affects confidentiality and integrity primarily, with limited direct availability impact. The ease of exploitation and remote attack vector make it a notable threat for organizations relying on JeecgBoot 3.9.0 for web applications.
Mitigation Recommendations
Since no official patch is available, organizations should implement immediate mitigations such as input validation and sanitization on the fileUrl parameter to restrict allowed URLs to trusted domains or IP ranges. Employ network-level controls like egress filtering and firewall rules to prevent the server from making unauthorized outbound requests, especially to internal or sensitive network segments. Use web application firewalls (WAFs) to detect and block suspicious SSRF attack patterns targeting the vulnerable endpoint. Monitor logs for unusual outbound HTTP requests originating from the application server. Consider isolating the application environment to limit the impact of potential SSRF exploitation. Engage with the JeecgBoot community or maintainers for updates and patches. Where feasible, upgrade to a later, unaffected version once available. Conduct penetration testing focused on SSRF vectors to validate mitigations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-21T17:34:36.056Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699b01d9be58cf853b401dab
Added to database: 2/22/2026, 1:17:13 PM
Last enriched: 2/22/2026, 1:31:39 PM
Last updated: 2/22/2026, 2:47:31 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2953: Path Traversal in Dromara UJCMS
MediumCVE-2026-2952: OS Command Injection in Vaelsys
MediumCVE-2026-2947: Cross Site Scripting in rymcu forest
MediumCVE-2026-2946: Cross Site Scripting in rymcu forest
MediumCVE-2026-2944: OS Command Injection in Tosei Online Store Management System ネット店舗管理システム
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.