Description
A vulnerability was identified in JeecgBoot up to 3.9.1. Affected by this issue is some unknown functionality of the file /sys/dict/loadTreeData of the component JSON Object Handler. The manipulation of the argument condition leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor confirms (translated from Chinese): "It should have been fixed; a batch of issues were recently resolved."
Problem types
Timeline
| 2026-05-07: | Advisory disclosed |
| 2026-05-07: | VulDB entry created |
| 2026-05-07: | VulDB entry last update |
Credits
JD Security SHENYI Team (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/361902 (VDB-361902 | JeecgBoot JSON Object loadTreeData sql injection)
vuldb.com/vuln/361902/cti (VDB-361902 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/808186 (Submit #808186 | https://github.com/jeecgboot/JeecgBoot <=3.91 SQL Injection)
github.com/jeecgboot/JeecgBoot/issues/9571
github.com/jeecgboot/JeecgBoot/