JimuReport thru version 2.1.3 is vulnerable to remote code execution when processing user-controlled H2 JDBC URLs. The application passes the attacker-supplied JDBC URL directly to the H2 driver, allowing the use of certain directives to execute arbitrary Java code. A different vulnerability than CVE-2025-10770.
References
| Link | Resource |
|---|---|
| https://gist.github.com/Catherines77/f15d53e9705b24cf018e5bffed3e8234 | Third Party Advisory |
| https://github.com/jeecgboot/jimureport/issues/4306 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
30 Jan 2026, 01:06
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Jeecg jimureport
Jeecg |
|
| References | () https://gist.github.com/Catherines77/f15d53e9705b24cf018e5bffed3e8234 - Third Party Advisory | |
| References | () https://github.com/jeecgboot/jimureport/issues/4306 - Exploit, Issue Tracking, Vendor Advisory | |
| CPE | cpe:2.3:a:jeecg:jimureport:*:*:*:*:*:*:*:* |
08 Jan 2026, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-08 20:15
Updated : 2026-01-30 01:06
NVD link : CVE-2025-66913
Mitre link : CVE-2025-66913
CVE.ORG link : CVE-2025-66913
JSON object : View
Products Affected
jeecg
- jimureport
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
