CVE-2026-2555

A weakness has been identified in JeecgBoot 3.9.1. This vulnerability affects the function importDocumentFromZip of the file org/jeecg/modules/airag/llm/controller/AiragKnowledgeController.java of the component Retrieval-Augmented Generation. Executing a manipulation can lead to deserialization. The attack can be launched remotely. Attacks of this nature are highly complex. It is stated that the exploitability is difficult. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/jeecgboot/JeecgBoot/ Product
https://github.com/jeecgboot/JeecgBoot/issues/9335 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.346163 Permissions Required VDB Entry
https://vuldb.com/?id.346163 Third Party Advisory VDB Entry
https://vuldb.com/?submit.750232 Third Party Advisory VDB Entry
https://github.com/jeecgboot/JeecgBoot/issues/9335 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jeecg:jeecg_boot:3.9.1:*:*:*:*:*:*:*

History

18 Feb 2026, 21:43

Type Values Removed Values Added
First Time Jeecg jeecg Boot
Jeecg
CPE cpe:2.3:a:jeecg:jeecg_boot:3.9.1:*:*:*:*:*:*:*
References () https://github.com/jeecgboot/JeecgBoot/ - () https://github.com/jeecgboot/JeecgBoot/ - Product
References () https://github.com/jeecgboot/JeecgBoot/issues/9335 - () https://github.com/jeecgboot/JeecgBoot/issues/9335 - Exploit, Issue Tracking, Third Party Advisory
References () https://vuldb.com/?ctiid.346163 - () https://vuldb.com/?ctiid.346163 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.346163 - () https://vuldb.com/?id.346163 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.750232 - () https://vuldb.com/?submit.750232 - Third Party Advisory, VDB Entry

18 Feb 2026, 17:52

Type Values Removed Values Added
Summary
  • (es) Una debilidad ha sido identificada en JeecgBoot 3.9.1. Esta vulnerabilidad afecta la función importDocumentFromZip del archivo org/jeecg/modules/airag/llm/controller/AiragKnowledgeController.java del componente Generación Aumentada por Recuperación. Ejecutar una manipulación puede conducir a la deserialización. El ataque puede ser lanzado remotamente. Ataques de esta naturaleza son altamente complejos. Se afirma que la explotabilidad es difícil. El proyecto fue informado del problema tempranamente a través de un informe de incidencias pero aún no ha respondido.

17 Feb 2026, 16:20

Type Values Removed Values Added
References () https://github.com/jeecgboot/JeecgBoot/issues/9335 - () https://github.com/jeecgboot/JeecgBoot/issues/9335 -

16 Feb 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-16 12:16

Updated : 2026-02-18 21:43


NVD link : CVE-2026-2555

Mitre link : CVE-2026-2555

CVE.ORG link : CVE-2026-2555


JSON object : View

Products Affected

jeecg

  • jeecg_boot
CWE
CWE-20

Improper Input Validation

CWE-502

Deserialization of Untrusted Data