{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-3405","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-01T06:55:21.512Z","datePublished":"2026-03-02T02:02:13.761Z","dateUpdated":"2026-03-02T13:36:44.184Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-02T02:02:13.761Z"},"title":"thinkgem JeeSite Connection path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"thinkgem","product":"JeeSite","versions":[{"version":"5.15.0","status":"affected"},{"version":"5.15.1","status":"affected"}],"cpes":["cpe:2.3:a:jeesite:jeesite:*:*:*:*:*:*:*:*"],"modules":["Connection Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in thinkgem JeeSite up to 5.15.1. The affected element is an unknown function of the component Connection Handler. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is described as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":2.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"LOW"}},{"cvssV3_1":{"version":"3.1","baseScore":3.1,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.1,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.1,"vectorString":"AV:N/AC:H/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-01T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-01T08:00:28.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Saul1213 (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB","type":"coordinator"}],"references":[{"url":"https://vuldb.com/?id.348300","name":"VDB-348300 | thinkgem JeeSite Connection path traversal","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.348300","name":"VDB-348300 | CTI Indicators (IOB, IOC, TTP)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.765097","name":"Submit #765097 | jeesite 5.15.1 JDBC Connection Injection","tags":["third-party-advisory"]},{"url":"https://www.yuque.com/la12138/pa2fpb/sg81mhkrat5h170c?singleDoc","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://vuldb.com/?submit.765097","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-02T13:36:19.428684Z","id":"CVE-2026-3405","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-02T13:36:44.184Z"}}]}}