Description
A vulnerability has been found in erzhongxmu JEEWMS 3.7. Affected by this issue is some unknown functionality of the file /plug-in/ueditor/jsp/getRemoteImage.jsp of the component UEditor. The manipulation of the argument upfile leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
Timeline
| 2026-02-23: | Advisory disclosed |
| 2026-02-23: | VulDB entry created |
| 2026-02-23: | VulDB entry last update |
Credits
din4 (VulDB User)
References
vuldb.com/?id.347382 (VDB-347382 | erzhongxmu JEEWMS UEditor getRemoteImage.jsp server-side request forgery)
vuldb.com/?ctiid.347382 (VDB-347382 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.756522 (Submit #756522 | erzhongxmu JEEWMS ≤3.7 Server-Side Request Forgery)
www.notion.so/...tor-Module-304ea92a3c41806782b1f7285ab0d580