2025-12-28 7:32CVE-2025-15126VulDB
PUBLISHED5.2CWE-285CWE-266

JeecgBoot getPositionUserList improper authorization

A weakness has been identified in JeecgBoot up to 3.9.0. Affected by this vulnerability is the function getPositionUserList of the file /sys/position/getPositionUserList. This manipulation of the argument positionId causes improper authorization. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Problem type

Affected products

JeecgBoot

3.0 - AFFECTED

3.1 - AFFECTED

3.2 - AFFECTED

3.3 - AFFECTED

3.4 - AFFECTED

3.5 - AFFECTED

3.6 - AFFECTED

3.7 - AFFECTED

3.8 - AFFECTED

3.9.0 - AFFECTED

References

GitHub Security Advisories

GHSA-xvv8-2hxw-mghp

A weakness has been identified in JeecgBoot up to 3.9.0. Affected by this vulnerability is the...

https://github.com/advisories/GHSA-xvv8-2hxw-mghp

A weakness has been identified in JeecgBoot up to 3.9.0. Affected by this vulnerability is the function getPositionUserList of the file /sys/position/getPositionUserList. This manipulation of the argument positionId causes improper authorization. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2025-15126
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2025-15126",
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "dateUpdated": "2025-12-28T07:32:06.264Z",
    "dateReserved": "2025-12-27T09:01:11.706Z",
    "datePublished": "2025-12-28T07:32:06.264Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB",
        "dateUpdated": "2025-12-28T07:32:06.264Z"
      },
      "title": "JeecgBoot getPositionUserList improper authorization",
      "descriptions": [
        {
          "lang": "en",
          "value": "A weakness has been identified in JeecgBoot up to 3.9.0. Affected by this vulnerability is the function getPositionUserList of the file /sys/position/getPositionUserList. This manipulation of the argument positionId causes improper authorization. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way."
        }
      ],
      "affected": [
        {
          "vendor": "n/a",
          "product": "JeecgBoot",
          "versions": [
            {
              "version": "3.0",
              "status": "affected"
            },
            {
              "version": "3.1",
              "status": "affected"
            },
            {
              "version": "3.2",
              "status": "affected"
            },
            {
              "version": "3.3",
              "status": "affected"
            },
            {
              "version": "3.4",
              "status": "affected"
            },
            {
              "version": "3.5",
              "status": "affected"
            },
            {
              "version": "3.6",
              "status": "affected"
            },
            {
              "version": "3.7",
              "status": "affected"
            },
            {
              "version": "3.8",
              "status": "affected"
            },
            {
              "version": "3.9.0",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Improper Authorization",
              "cweId": "CWE-285",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Incorrect Privilege Assignment",
              "cweId": "CWE-266",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://vuldb.com/?id.338504",
          "name": "VDB-338504 | JeecgBoot getPositionUserList improper authorization",
          "tags": [
            "vdb-entry",
            "technical-description"
          ]
        },
        {
          "url": "https://vuldb.com/?ctiid.338504",
          "name": "VDB-338504 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ]
        },
        {
          "url": "https://vuldb.com/?submit.711782",
          "name": "Submit #711782 | JeecgBoot 3.9.0 Improper Control of Resource Identifiers",
          "tags": [
            "third-party-advisory"
          ]
        },
        {
          "url": "https://github.com/Hwwg/cve/issues/39",
          "tags": [
            "exploit",
            "issue-tracking"
          ]
        }
      ],
      "metrics": [
        {},
        {
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R",
            "baseScore": 3.1,
            "baseSeverity": "LOW"
          }
        },
        {
          "cvssV3_0": {
            "version": "3.0",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R",
            "baseScore": 3.1,
            "baseSeverity": "LOW"
          }
        },
        {
          "cvssV2_0": {
            "version": "2.0",
            "vectorString": "AV:N/AC:H/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR",
            "baseScore": 2.1
          }
        }
      ],
      "timeline": [
        {
          "time": "2025-12-27T00:00:00.000Z",
          "lang": "en",
          "value": "Advisory disclosed"
        },
        {
          "time": "2025-12-27T01:00:00.000Z",
          "lang": "en",
          "value": "VulDB entry created"
        },
        {
          "time": "2025-12-27T10:06:28.000Z",
          "lang": "en",
          "value": "VulDB entry last update"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "huangweigang (VulDB User)",
          "type": "reporter"
        }
      ]
    }
  }
}