2025-12-28 4:32CVE-2025-15121VulDB
PUBLISHED5.2CWE-200CWE-284

JeecgBoot getDeptRoleByUserId information disclosure

A vulnerability has been found in JeecgBoot up to 3.9.0. The affected element is the function getDeptRoleByUserId of the file /sys/sysDepartRole/getDeptRoleByUserId. Such manipulation of the argument departId leads to information disclosure. The vendor was contacted early about this disclosure but did not respond in any way.

Problem type

Affected products

JeecgBoot

3.0 - AFFECTED

3.1 - AFFECTED

3.2 - AFFECTED

3.3 - AFFECTED

3.4 - AFFECTED

3.5 - AFFECTED

3.6 - AFFECTED

3.7 - AFFECTED

3.8 - AFFECTED

3.9.0 - AFFECTED

References

JSON source

https://cveawg.mitre.org/api/cve/CVE-2025-15121
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2025-15121",
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "dateUpdated": "2025-12-28T04:32:06.152Z",
    "dateReserved": "2025-12-27T09:00:57.900Z",
    "datePublished": "2025-12-28T04:32:06.152Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB",
        "dateUpdated": "2025-12-28T04:32:06.152Z"
      },
      "title": "JeecgBoot getDeptRoleByUserId information disclosure",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been found in JeecgBoot up to 3.9.0. The affected element is the function getDeptRoleByUserId of the file /sys/sysDepartRole/getDeptRoleByUserId. Such manipulation of the argument departId leads to information disclosure. The vendor was contacted early about this disclosure but did not respond in any way."
        }
      ],
      "affected": [
        {
          "vendor": "n/a",
          "product": "JeecgBoot",
          "versions": [
            {
              "version": "3.0",
              "status": "affected"
            },
            {
              "version": "3.1",
              "status": "affected"
            },
            {
              "version": "3.2",
              "status": "affected"
            },
            {
              "version": "3.3",
              "status": "affected"
            },
            {
              "version": "3.4",
              "status": "affected"
            },
            {
              "version": "3.5",
              "status": "affected"
            },
            {
              "version": "3.6",
              "status": "affected"
            },
            {
              "version": "3.7",
              "status": "affected"
            },
            {
              "version": "3.8",
              "status": "affected"
            },
            {
              "version": "3.9.0",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Information Disclosure",
              "cweId": "CWE-200",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Improper Access Controls",
              "cweId": "CWE-284",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://vuldb.com/?id.338499",
          "name": "VDB-338499 | JeecgBoot getDeptRoleByUserId information disclosure",
          "tags": [
            "vdb-entry",
            "technical-description"
          ]
        },
        {
          "url": "https://vuldb.com/?ctiid.338499",
          "name": "VDB-338499 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ]
        },
        {
          "url": "https://vuldb.com/?submit.711773",
          "name": "Submit #711773 | JeecgBoot 3.9.0 Improper Control of Resource Identifiers",
          "tags": [
            "third-party-advisory"
          ]
        },
        {
          "url": "https://github.com/Hwwg/cve/issues/34",
          "tags": [
            "issue-tracking"
          ]
        }
      ],
      "metrics": [
        {},
        {
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:X/RL:X/RC:R",
            "baseScore": 2.4,
            "baseSeverity": "LOW"
          }
        },
        {
          "cvssV3_0": {
            "version": "3.0",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:X/RL:X/RC:R",
            "baseScore": 2.4,
            "baseSeverity": "LOW"
          }
        },
        {
          "cvssV2_0": {
            "version": "2.0",
            "vectorString": "AV:A/AC:L/Au:M/C:P/I:N/A:N/E:ND/RL:ND/RC:UR",
            "baseScore": 2.2
          }
        }
      ],
      "timeline": [
        {
          "time": "2025-12-27T00:00:00.000Z",
          "lang": "en",
          "value": "Advisory disclosed"
        },
        {
          "time": "2025-12-27T01:00:00.000Z",
          "lang": "en",
          "value": "VulDB entry created"
        },
        {
          "time": "2025-12-27T10:06:19.000Z",
          "lang": "en",
          "value": "VulDB entry last update"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "huangweigang (VulDB User)",
          "type": "reporter"
        }
      ]
    }
  }
}