CVE-2026-3404

A flaw has been found in thinkgem JeeSite up to 5.15.1. Impacted is an unknown function of the file /com/jeesite/common/shiro/cas/CasOutHandler.java of the component Endpoint. Executing a manipulation can lead to xml external entity reference. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://vuldb.com/?ctiid.348299 Permissions Required VDB Entry
https://vuldb.com/?id.348299 Third Party Advisory VDB Entry
https://vuldb.com/?submit.763732 Third Party Advisory VDB Entry
https://www.yuque.com/la12138/pa2fpb/ew8x2qss8dv0bsu0?singleDoc Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jeesite:jeesite:*:*:*:*:*:*:*:*

History

09 Mar 2026, 16:52

Type Values Removed Values Added
CPE cpe:2.3:a:jeesite:jeesite:*:*:*:*:*:*:*:*
First Time Jeesite jeesite
Jeesite
References () https://vuldb.com/?ctiid.348299 - () https://vuldb.com/?ctiid.348299 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.348299 - () https://vuldb.com/?id.348299 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.763732 - () https://vuldb.com/?submit.763732 - Third Party Advisory, VDB Entry
References () https://www.yuque.com/la12138/pa2fpb/ew8x2qss8dv0bsu0?singleDoc - () https://www.yuque.com/la12138/pa2fpb/ew8x2qss8dv0bsu0?singleDoc - Exploit, Third Party Advisory

02 Mar 2026, 20:30

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en thinkgem JeeSite hasta la versión 5.15.1, la cual afecta a una función desconocida del archivo /com/jeesite/common/shiro/cas/CasOutHandler.java del componente Endpoint. Su manipulación puede conducir a una referencia a entidad externa XML. El ataque puede realizarse de forma remota. Los ataques de esta naturaleza son altamente complejos y su explotabilidad difícil. El exploit ha sido publicado y puede ser utilizado. Antes de divulgar esta vulnerabilidad se contactó con el proveedor, pero no respondió de ninguna manera.

02 Mar 2026, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-02 02:16

Updated : 2026-03-09 16:52


NVD link : CVE-2026-3404

Mitre link : CVE-2026-3404

CVE.ORG link : CVE-2026-3404


JSON object : View

Products Affected

jeesite

  • jeesite
CWE
CWE-610

Externally Controlled Reference to a Resource in Another Sphere

CWE-611

Improper Restriction of XML External Entity Reference