{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2945","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-21T17:34:36.056Z","datePublished":"2026-02-22T13:02:13.406Z","dateUpdated":"2026-02-25T16:27:44.943Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-22T13:02:13.406Z"},"title":"JeecgBoot uploadImgByHttp server-side request forgery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-918","lang":"en","description":"Server-Side Request Forgery"}]}],"affected":[{"vendor":"n/a","product":"JeecgBoot","versions":[{"version":"3.9.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in JeecgBoot 3.9.0. Affected by this vulnerability is an unknown functionality of the file /sys/common/uploadImgByHttp. Executing a manipulation of the argument fileUrl can lead to server-side request forgery. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-21T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-21T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-21T18:39:42.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Saul1213 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.347315","name":"VDB-347315 | JeecgBoot uploadImgByHttp server-side request forgery","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.347315","name":"VDB-347315 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.754590","name":"Submit #754590 | jeecgboot 3.9.0 Server-Side Request Forgery","tags":["third-party-advisory"]},{"url":"https://www.yuque.com/la12138/vxbwk9/glws4ppukxqtpfhl?singleDoc","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-25T16:27:31.951617Z","id":"CVE-2026-2945","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-25T16:27:44.943Z"}}]}}