Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2945: Server-Side Request Forgery in JeecgBoot

0
Medium
VulnerabilityCVE-2026-2945cvecve-2026-2945
Published: Sun Feb 22 2026 (02/22/2026, 13:02:13 UTC)
Source: CVE Database V5
Product: JeecgBoot

Description

CVE-2026-2945 is a server-side request forgery (SSRF) vulnerability found in JeecgBoot version 3. 9. 0, specifically in the /sys/common/uploadImgByHttp endpoint. An attacker can manipulate the fileUrl parameter to make the server send unauthorized requests to internal or external resources. This vulnerability can be exploited remotely without authentication or user interaction. Although the vendor was notified, no patch or response has been provided. The CVSS 4. 0 base score is 5. 3, indicating medium severity. Exploits have been publicly disclosed but no confirmed in-the-wild attacks are reported.

AI-Powered Analysis

AILast updated: 02/22/2026, 13:31:39 UTC

Technical Analysis

CVE-2026-2945 is a server-side request forgery vulnerability affecting JeecgBoot version 3.9.0, a rapid development platform for enterprise applications. The vulnerability exists in an unspecified functionality related to the /sys/common/uploadImgByHttp endpoint, where the fileUrl parameter is improperly validated or sanitized. An attacker can craft malicious requests that cause the server to initiate HTTP requests to arbitrary URLs, potentially accessing internal network resources or external systems. SSRF vulnerabilities can be leveraged to bypass firewall restrictions, scan internal networks, access sensitive metadata services, or exploit other internal services not directly exposed to the internet. The vulnerability requires no authentication or user interaction, increasing its risk profile. The vendor was contacted but has not issued a patch or advisory, and a public exploit is available, raising the urgency for mitigation. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability individually but combined can lead to significant risk. No known exploits in the wild have been confirmed yet, but public exploit availability increases the likelihood of future attacks.

Potential Impact

The SSRF vulnerability in JeecgBoot 3.9.0 can allow attackers to perform unauthorized requests from the vulnerable server, potentially exposing internal services, sensitive data, or cloud metadata endpoints. This can lead to information disclosure, internal network reconnaissance, and possibly pivoting to further attacks such as remote code execution if chained with other vulnerabilities. Organizations using JeecgBoot in enterprise environments may face increased risk of data breaches or service disruptions. The lack of vendor response and patch increases exposure time, making timely mitigation critical. The medium CVSS score reflects moderate direct impact but significant potential for exploitation in complex attack scenarios. The vulnerability affects confidentiality and integrity primarily, with limited direct availability impact. The ease of exploitation and remote attack vector make it a notable threat for organizations relying on JeecgBoot 3.9.0 for web applications.

Mitigation Recommendations

Since no official patch is available, organizations should implement immediate mitigations such as input validation and sanitization on the fileUrl parameter to restrict allowed URLs to trusted domains or IP ranges. Employ network-level controls like egress filtering and firewall rules to prevent the server from making unauthorized outbound requests, especially to internal or sensitive network segments. Use web application firewalls (WAFs) to detect and block suspicious SSRF attack patterns targeting the vulnerable endpoint. Monitor logs for unusual outbound HTTP requests originating from the application server. Consider isolating the application environment to limit the impact of potential SSRF exploitation. Engage with the JeecgBoot community or maintainers for updates and patches. Where feasible, upgrade to a later, unaffected version once available. Conduct penetration testing focused on SSRF vectors to validate mitigations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-21T17:34:36.056Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699b01d9be58cf853b401dab

Added to database: 2/22/2026, 1:17:13 PM

Last enriched: 2/22/2026, 1:31:39 PM

Last updated: 2/22/2026, 2:47:31 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats