{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-5848","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-08T19:11:02.419Z","datePublished":"2026-04-09T05:15:11.492Z","dateUpdated":"2026-04-09T14:49:08.071Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-09T05:15:11.492Z"},"title":"jeecgboot JimuReport Data Source testConnection DriverManager.getConnection code injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"jeecgboot","product":"JimuReport","versions":[{"version":"2.0","status":"affected"},{"version":"2.1","status":"affected"},{"version":"2.2","status":"affected"},{"version":"2.3.0","status":"affected"}],"modules":["Data Source Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in jeecgboot JimuReport up to 2.3.0. The affected element is the function DriverManager.getConnection of the file /drag/onlDragDataSource/testConnection of the component Data Source Handler. Performing a manipulation of the argument dbUrl results in code injection. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor confirmed the issue and will provide a fix in the upcoming release."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:C"}}],"timeline":[{"time":"2026-04-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-08T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-08T21:16:07.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"anch0r (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB CNA Team","type":"coordinator"}],"references":[{"url":"https://vuldb.com/vuln/356374","name":"VDB-356374 | jeecgboot JimuReport Data Source testConnection DriverManager.getConnection code injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/356374/cti","name":"VDB-356374 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/790769","name":"Submit #790769 | jeecgboot jimureport <= 2.3.0 Code Injection","tags":["third-party-advisory"]},{"url":"https://github.com/jeecgboot/jimureport/issues/4587","tags":["exploit","issue-tracking"]},{"url":"https://github.com/jeecgboot/jimureport/issues/4587#issuecomment-4152596778","tags":["issue-tracking"]},{"url":"https://github.com/jeecgboot/jimureport/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-09T14:48:56.890945Z","id":"CVE-2026-5848","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-09T14:49:08.071Z"}}]}}