CVE-2026-3028: Cross Site Scripting in erzhongxmu JEEWMS
A vulnerability was determined in erzhongxmu JEEWMS up to 3.7. This vulnerability affects the function doAdd of the file src/main/java/com/jeecg/demo/controller/JeecgListDemoController.java. This manipulation of the argument Name causes cross site scripting. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-3028 identifies a cross-site scripting vulnerability in the erzhongxmu JEEWMS product, specifically affecting versions 3.0 through 3.7. The vulnerability resides in the doAdd method within the JeecgListDemoController.java source file, where the 'Name' parameter is not properly sanitized or encoded before being reflected in the web response. This allows an attacker to craft malicious input that, when submitted remotely, can execute arbitrary JavaScript in the context of the victim's browser. The attack vector is network accessible without requiring authentication, increasing the exposure. However, exploitation requires user interaction, such as clicking a malicious link or submitting a crafted form. The vulnerability impacts the confidentiality and integrity of user sessions by enabling theft of cookies, session tokens, or performing unauthorized actions on behalf of the user. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the ease of remote exploitation balanced against the need for user interaction and limited impact on availability. Despite public disclosure, no official patches or vendor responses have been issued, leaving affected systems exposed. No known exploits in the wild have been reported yet, but the public availability of the vulnerability details increases the risk of future attacks.
Potential Impact
The primary impact of CVE-2026-3028 is the compromise of user confidentiality and integrity through cross-site scripting attacks. Attackers can steal session cookies, perform actions on behalf of authenticated users, or deface web content, potentially damaging organizational reputation and user trust. While availability is not directly affected, successful exploitation could lead to secondary attacks such as phishing or malware delivery. Organizations relying on JEEWMS for enterprise workflow or content management may face data leakage or unauthorized access risks. The lack of vendor response and patches prolongs exposure, increasing the window for attackers to develop and deploy exploits. The medium severity rating indicates moderate risk, but the ease of remote exploitation without authentication makes it a significant concern for organizations with exposed JEEWMS instances, especially those accessible over the internet.
Mitigation Recommendations
Since no official patches are available, organizations should implement immediate compensating controls. These include applying strict input validation and output encoding on the 'Name' parameter within the affected doAdd function to neutralize malicious scripts. Web application firewalls (WAFs) can be configured to detect and block typical XSS payloads targeting this endpoint. Restricting access to the JEEWMS application to trusted networks or VPNs reduces exposure to remote attackers. Educate users about the risks of clicking suspicious links or submitting untrusted input. Regularly monitor web server logs for unusual requests targeting the vulnerable function. Consider upgrading or migrating to alternative solutions if vendor support remains absent. Finally, implement Content Security Policy (CSP) headers to limit the impact of any successful script injection by restricting script sources.
Affected Countries
China, India, United States, Germany, United Kingdom, France, Japan, South Korea, Brazil, Russia
CVE-2026-3028: Cross Site Scripting in erzhongxmu JEEWMS
Description
A vulnerability was determined in erzhongxmu JEEWMS up to 3.7. This vulnerability affects the function doAdd of the file src/main/java/com/jeecg/demo/controller/JeecgListDemoController.java. This manipulation of the argument Name causes cross site scripting. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2026-3028 identifies a cross-site scripting vulnerability in the erzhongxmu JEEWMS product, specifically affecting versions 3.0 through 3.7. The vulnerability resides in the doAdd method within the JeecgListDemoController.java source file, where the 'Name' parameter is not properly sanitized or encoded before being reflected in the web response. This allows an attacker to craft malicious input that, when submitted remotely, can execute arbitrary JavaScript in the context of the victim's browser. The attack vector is network accessible without requiring authentication, increasing the exposure. However, exploitation requires user interaction, such as clicking a malicious link or submitting a crafted form. The vulnerability impacts the confidentiality and integrity of user sessions by enabling theft of cookies, session tokens, or performing unauthorized actions on behalf of the user. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the ease of remote exploitation balanced against the need for user interaction and limited impact on availability. Despite public disclosure, no official patches or vendor responses have been issued, leaving affected systems exposed. No known exploits in the wild have been reported yet, but the public availability of the vulnerability details increases the risk of future attacks.
Potential Impact
The primary impact of CVE-2026-3028 is the compromise of user confidentiality and integrity through cross-site scripting attacks. Attackers can steal session cookies, perform actions on behalf of authenticated users, or deface web content, potentially damaging organizational reputation and user trust. While availability is not directly affected, successful exploitation could lead to secondary attacks such as phishing or malware delivery. Organizations relying on JEEWMS for enterprise workflow or content management may face data leakage or unauthorized access risks. The lack of vendor response and patches prolongs exposure, increasing the window for attackers to develop and deploy exploits. The medium severity rating indicates moderate risk, but the ease of remote exploitation without authentication makes it a significant concern for organizations with exposed JEEWMS instances, especially those accessible over the internet.
Mitigation Recommendations
Since no official patches are available, organizations should implement immediate compensating controls. These include applying strict input validation and output encoding on the 'Name' parameter within the affected doAdd function to neutralize malicious scripts. Web application firewalls (WAFs) can be configured to detect and block typical XSS payloads targeting this endpoint. Restricting access to the JEEWMS application to trusted networks or VPNs reduces exposure to remote attackers. Educate users about the risks of clicking suspicious links or submitting untrusted input. Regularly monitor web server logs for unusual requests targeting the vulnerable function. Consider upgrading or migrating to alternative solutions if vendor support remains absent. Finally, implement Content Security Policy (CSP) headers to limit the impact of any successful script injection by restricting script sources.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-23T14:05:23.655Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699ccae3be58cf853bccda00
Added to database: 2/23/2026, 9:47:15 PM
Last enriched: 2/23/2026, 10:01:30 PM
Last updated: 2/24/2026, 5:42:50 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3070: Cross Site Scripting in SourceCodester Modern Image Gallery App
MediumCVE-2026-3069: SQL Injection in itsourcecode Document Management System
MediumCVE-2026-3068: SQL Injection in itsourcecode Document Management System
MediumCVE-2026-3067: Path Traversal in HummerRisk
MediumCVE-2026-3066: Command Injection in HummerRisk
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.