{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-10319","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-09-12T08:05:12.228Z","datePublished":"2025-09-12T15:02:07.197Z","dateUpdated":"2025-09-12T15:40:36.782Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-09-12T15:02:07.197Z"},"title":"JeecgBoot Tenant Log Export exportLog improper authorization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-285","lang":"en","description":"Improper Authorization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"Incorrect Privilege Assignment"}]}],"affected":[{"vendor":"n/a","product":"JeecgBoot","versions":[{"version":"3.8.0","status":"affected"},{"version":"3.8.1","status":"affected"},{"version":"3.8.2","status":"affected"}],"modules":["Tenant Log Export"]}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in JeecgBoot up to 3.8.2. Affected by this issue is some unknown functionality of the file /sys/tenant/exportLog of the component Tenant Log Export. The manipulation results in improper authorization. The attack can be launched remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In JeecgBoot bis 3.8.2 ist eine Schwachstelle entdeckt worden. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /sys/tenant/exportLog der Komponente Tenant Log Export. Durch das Manipulieren mit unbekannten Daten kann eine improper authorization-Schwachstelle ausgenutzt werden. Der Angriff lässt sich über das Netzwerk starten. Der Exploit ist öffentlich verfügbar und könnte genutzt werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-09-12T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-09-12T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-09-12T10:10:18.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"aibot88 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.323743","name":"VDB-323743 | JeecgBoot Tenant Log Export exportLog improper authorization","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.323743","name":"VDB-323743 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.643839","name":"Submit #643839 | jeecgboot JeecgBoot latest broken function level authorisation","tags":["third-party-advisory"]},{"url":"https://www.cnblogs.com/aibot/p/19063358","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://www.cnblogs.com/aibot/p/19063358","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-12T15:32:54.783867Z","id":"CVE-2025-10319","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-12T15:40:36.782Z"}}]}}