A vulnerability was found in thinkgem JeeSite up to 5.12.1. This affects the function decodeUrl2 of the file common/src/main/java/com/jeesite/common/codec/EncodeUtils.java. The manipulation results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 5.13.0 mitigates this issue. The patch is identified as 63773c97a56bdb3649510e83b66c16db4754965b. Upgrading the affected component is recommended.
References
Link | Resource |
---|---|
https://github.com/thinkgem/jeesite5/commit/63773c97a56bdb3649510e83b66c16db4754965b | Patch |
https://github.com/thinkgem/jeesite5/issues/33 | Exploit Issue Tracking |
https://github.com/thinkgem/jeesite5/issues/33#issue-3330107533 | Exploit Issue Tracking |
https://github.com/thinkgem/jeesite5/issues/33#issuecomment-3197374560 | Exploit Issue Tracking |
https://github.com/thinkgem/jeesite5/releases/tag/v5.13.0.springboo3 | Release Notes |
https://vuldb.com/?ctiid.322111 | Permissions Required VDB Entry |
https://vuldb.com/?id.322111 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.641125 | Third Party Advisory VDB Entry |
https://github.com/thinkgem/jeesite5/issues/33 | Exploit Issue Tracking |
https://github.com/thinkgem/jeesite5/issues/33#issue-3330107533 | Exploit Issue Tracking |
https://github.com/thinkgem/jeesite5/issues/33#issuecomment-3197374560 | Exploit Issue Tracking |
Configurations
History
04 Sep 2025, 16:54
Type | Values Removed | Values Added |
---|---|---|
First Time |
Jeesite jeesite
Jeesite |
|
CPE | cpe:2.3:a:jeesite:jeesite:*:*:*:*:-:*:*:* | |
References | () https://github.com/thinkgem/jeesite5/commit/63773c97a56bdb3649510e83b66c16db4754965b - Patch | |
References | () https://github.com/thinkgem/jeesite5/issues/33 - Exploit, Issue Tracking | |
References | () https://github.com/thinkgem/jeesite5/issues/33#issue-3330107533 - Exploit, Issue Tracking | |
References | () https://github.com/thinkgem/jeesite5/issues/33#issuecomment-3197374560 - Exploit, Issue Tracking | |
References | () https://github.com/thinkgem/jeesite5/releases/tag/v5.13.0.springboo3 - Release Notes | |
References | () https://vuldb.com/?ctiid.322111 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.322111 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.641125 - Third Party Advisory, VDB Entry |
02 Sep 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/thinkgem/jeesite5/issues/33 - | |
References | () https://github.com/thinkgem/jeesite5/issues/33#issue-3330107533 - | |
References | () https://github.com/thinkgem/jeesite5/issues/33#issuecomment-3197374560 - |
01 Sep 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-01 22:15
Updated : 2025-09-04 16:54
NVD link : CVE-2025-9796
Mitre link : CVE-2025-9796
CVE.ORG link : CVE-2025-9796
JSON object : View
Products Affected
jeesite
- jeesite