{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-10978","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-09-25T14:20:59.376Z","datePublished":"2025-09-25T22:32:11.908Z","dateUpdated":"2025-09-26T19:11:50.060Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-09-25T22:32:11.908Z"},"title":"JeecgBoot Filter exportXls improper authorization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-285","lang":"en","description":"Improper Authorization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"Incorrect Privilege Assignment"}]}],"affected":[{"vendor":"n/a","product":"JeecgBoot","versions":[{"version":"3.8.0","status":"affected"},{"version":"3.8.1","status":"affected"},{"version":"3.8.2","status":"affected"}],"modules":["Filter Handler"]}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine Schwachstelle in JeecgBoot up to 3.8.2 entdeckt. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /sys/user/exportXls der Komponente Filter Handler. Die Bearbeitung verursacht improper authorization. Der Angriff lässt sich über das Netzwerk starten. Die Ausnutzung wurde veröffentlicht und kann verwendet werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-09-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-09-25T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-09-25T16:26:15.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"lucasg2g (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.325849","name":"VDB-325849 | JeecgBoot Filter exportXls improper authorization","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.325849","name":"VDB-325849 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.653336","name":"Submit #653336 | jeecgboot  JeecgBoot 3.8.2 broken function level authorization","tags":["third-party-advisory"]},{"url":"https://www.cnblogs.com/aibot/p/19063352","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-26T19:11:38.411598Z","id":"CVE-2025-10978","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-26T19:11:50.060Z"}}]}}