Description
A vulnerability was found in jeecgboot JimuReport up to 2.3.0. The affected element is the function DriverManager.getConnection of the file /drag/onlDragDataSource/testConnection of the component Data Source Handler. Performing a manipulation of the argument dbUrl results in code injection. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor confirmed the issue and will provide a fix in the upcoming release.
Problem types
Product status
2.1
2.2
2.3.0
Timeline
| 2026-04-08: | Advisory disclosed |
| 2026-04-08: | VulDB entry created |
| 2026-04-08: | VulDB entry last update |
Credits
anch0r (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/356374 (VDB-356374 | jeecgboot JimuReport Data Source testConnection DriverManager.getConnection code injection)
vuldb.com/vuln/356374/cti (VDB-356374 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/790769 (Submit #790769 | jeecgboot jimureport <= 2.3.0 Code Injection)
github.com/jeecgboot/jimureport/issues/4587
github.com/jeecgboot/jimureport/issues/4587
github.com/jeecgboot/jimureport/