Jeecgboot versions 3.8.2 and earlier are affected by a path traversal vulnerability. The endpoint is /sys/comment/addFile. This vulnerability allows attackers to upload files with system-whitelisted extensions to the system directory /opt, instead of the /opt/upFiles directory specified by the web server.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/jeecgboot/JeecgBoot/issues/8827 |
|
History
Tue, 07 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jeecg jeecg Boot
|
|
| CPEs | cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Jeecg jeecg Boot
|
Thu, 02 Oct 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jeecg
Jeecg jeecgboot |
|
| Vendors & Products |
Jeecg
Jeecg jeecgboot |
Wed, 01 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-24 | |
| Metrics |
cvssV3_1
|
Wed, 01 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jeecgboot versions 3.8.2 and earlier are affected by a path traversal vulnerability. The endpoint is /sys/comment/addFile. This vulnerability allows attackers to upload files with system-whitelisted extensions to the system directory /opt, instead of the /opt/upFiles directory specified by the web server. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-10-01T00:00:00.000Z
Updated: 2025-10-01T20:20:03.964Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61189
Updated: 2025-10-01T20:19:58.661Z
Status : Analyzed
Published: 2025-10-01T20:18:39.163
Modified: 2025-10-07T14:42:52.407
Link: CVE-2025-61189
No data.