CVE-2026-5848
jeecgboot JimuReport Data Source testConnection DriverManager.getConnection code injection
CVSS Score
4.7
EPSS Score
0.1%
EPSS Percentile
16th
A vulnerability was found in jeecgboot JimuReport up to 2.3.0. The affected element is the function DriverManager.getConnection of the file /drag/onlDragDataSource/testConnection of the component Data Source Handler. Performing a manipulation of the argument dbUrl results in code injection. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor confirmed the issue and will provide a fix in the upcoming release.
| CWE | CWE-94 CWE-74 |
| Vendor | jeecgboot |
| Product | jimureport |
| Published | Apr 9, 2026 |
| Last Updated | Apr 9, 2026 |
Stay Ahead of the Next One
Get instant alerts for jeecgboot jimureport
Be the first to know when new medium vulnerabilities affecting jeecgboot jimureport are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
jeecgboot / JimuReport
2.0 2.1 2.2 2.3.0
References
vuldb.com: https://vuldb.com/vuln/356374 vuldb.com: https://vuldb.com/vuln/356374/cti vuldb.com: https://vuldb.com/submit/790769 github.com: https://github.com/jeecgboot/jimureport/issues/4587 github.com: https://github.com/jeecgboot/jimureport/issues/4587#issuecomment-4152596778 github.com: https://github.com/jeecgboot/jimureport/
Credits
๐ anch0r (VulDB User) VulDB CNA Team