A weakness has been identified in JeecgBoot up to 3.9.0. Affected by this vulnerability is the function getPositionUserList of the file /sys/position/getPositionUserList. This manipulation of the argument positionId causes improper authorization. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/Hwwg/cve/issues/39 | Exploit |
| https://vuldb.com/?ctiid.338504 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338504 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.711782 | Exploit Third Party Advisory VDB Entry |
Configurations
History
30 Dec 2025, 19:13
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-863 | |
| CPE | cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:* | |
| First Time |
Jeecg jeecg Boot
Jeecg |
|
| References | () https://github.com/Hwwg/cve/issues/39 - Exploit | |
| References | () https://vuldb.com/?ctiid.338504 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.338504 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.711782 - Exploit, Third Party Advisory, VDB Entry |
28 Dec 2025, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-28 08:15
Updated : 2025-12-30 19:13
NVD link : CVE-2025-15126
Mitre link : CVE-2025-15126
CVE.ORG link : CVE-2025-15126
JSON object : View
Products Affected
jeecg
- jeecg_boot
