Description
A vulnerability was determined in JeecgBoot up to 3.9.1. Impacted is the function SqlInjectionUtil of the file jeecg-boot/jeecg-boot-base-core/src/main/java/org/jeecg/common/util/SqlInjectionUtil.java of the component loadDict Endpoint. This manipulation of the argument keyword causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. Patch name: a9c8e8eb1185751c4c3c68d2a53f3dadee9edc6b. To fix this issue, it is recommended to deploy a patch.
Problem types
Timeline
| 2026-04-28: | Advisory disclosed |
| 2026-04-28: | VulDB entry created |
| 2026-04-28: | VulDB entry last update |
Credits
larlarua (VulDB User)
References
vuldb.com/vuln/359948 (VDB-359948 | JeecgBoot loadDict Endpoint SqlInjectionUtil.java SqlInjectionUtil sql injection)
vuldb.com/vuln/359948/cti (VDB-359948 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/803072 (Submit #803072 | JEECG JeecgBoot v3.9.1 SQL Injection)
github.com/jeecgboot/JeecgBoot/issues/9491
github.com/jeecgboot/JeecgBoot/pull/9493
github.com/...ommit/a9c8e8eb1185751c4c3c68d2a53f3dadee9edc6b
github.com/jeecgboot/JeecgBoot/