Jeecgboot versions 3.8.2 and earlier are affected by a path traversal vulnerability. The endpoint is /sys/comment/addFile. This vulnerability allows attackers to upload files with system-whitelisted extensions to the system directory /opt, instead of the /opt/upFiles directory specified by the web server.
References
| Link | Resource |
|---|---|
| https://github.com/jeecgboot/JeecgBoot/issues/8827 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
07 Oct 2025, 14:42
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:* | |
| First Time |
Jeecg jeecg Boot
Jeecg |
|
| References | () https://github.com/jeecgboot/JeecgBoot/issues/8827 - Exploit, Issue Tracking, Vendor Advisory |
01 Oct 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
| CWE | CWE-24 |
01 Oct 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-01 20:18
Updated : 2025-10-07 14:42
NVD link : CVE-2025-61189
Mitre link : CVE-2025-61189
CVE.ORG link : CVE-2025-61189
JSON object : View
Products Affected
jeecg
- jeecg_boot
CWE
CWE-24
Path Traversal: '../filedir'
