{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2822","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-19T17:19:57.241Z","datePublished":"2026-02-20T04:32:10.809Z","dateUpdated":"2026-02-23T19:00:13.575Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T10:30:35.015Z"},"title":"JeecgBoot Backend airag_app,1,create_by sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"n/a","product":"JeecgBoot","versions":[{"version":"3.9.0","status":"affected"},{"version":"3.9.1","status":"affected"}],"modules":["Backend Interface"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in JeecgBoot up to 3.9.1. The affected element is an unknown function of the file /jeecgboot/sys/dict/loadDict/airag_app,1,create_by of the component Backend Interface. Such manipulation of the argument keyword leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-19T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-22T08:50:35.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"jjcc20220820 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.346947","name":"VDB-346947 | JeecgBoot Backend airag_app,1,create_by sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.346947","name":"VDB-346947 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.753792","name":"Submit #753792 | Beijing Guoju Information Technology Co., Ltd. JeecgBoot <=3.9.1 sql","tags":["third-party-advisory"]},{"url":"https://www.yuque.com/meizhiyuwai/ha3yxb/lowxgbh5nne881e6","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-23T18:59:27.256790Z","id":"CVE-2026-2822","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-23T19:00:13.575Z"}}]}}