{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-10707","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-09-19T06:00:25.244Z","datePublished":"2025-09-19T11:32:10.286Z","dateUpdated":"2025-09-19T13:07:22.821Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-09-19T11:32:10.286Z"},"title":"JeecgBoot sendMsg improper authorization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-285","lang":"en","description":"Improper Authorization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"Incorrect Privilege Assignment"}]}],"affected":[{"vendor":"n/a","product":"JeecgBoot","versions":[{"version":"3.8.0","status":"affected"},{"version":"3.8.1","status":"affected"},{"version":"3.8.2","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in JeecgBoot up to 3.8.2. Affected is an unknown function of the file /message/sysMessageTemplate/sendMsg. Executing manipulation can lead to improper authorization. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In JeecgBoot bis 3.8.2 ist eine Schwachstelle entdeckt worden. Davon betroffen ist unbekannter Code der Datei /message/sysMessageTemplate/sendMsg. Die Bearbeitung verursacht improper authorization. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-09-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-09-19T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-09-19T08:05:28.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"aibot88 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.324995","name":"VDB-324995 | JeecgBoot sendMsg improper authorization","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.324995","name":"VDB-324995 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.644659","name":"Submit #644659 | jeecgboot JeecgBoot latest broken function level authorization","tags":["third-party-advisory"]},{"url":"https://www.cnblogs.com/aibot/p/19063346","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://www.cnblogs.com/aibot/p/19063346","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-19T13:07:19.341092Z","id":"CVE-2025-10707","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-19T13:07:22.821Z"}}]}}