CVE-2025-15126
Unknown Unknown - Not Provided
Improper Authorization in JeecgBoot getPositionUserList Function

Publication date: 2025-12-28

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in JeecgBoot up to 3.9.0. Affected by this vulnerability is the function getPositionUserList of the file /sys/position/getPositionUserList. This manipulation of the argument positionId causes improper authorization. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-28
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2025-12-28
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
jeecg jeecgboot 3.9.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in JeecgBoot up to version 3.9.0, specifically in the function getPositionUserList located in the file /sys/position/getPositionUserList. It involves manipulation of the argument positionId, which leads to improper authorization. This means an attacker could potentially access or retrieve user position information without proper permissions. The attack can be initiated remotely, but it is considered to have a high complexity and is difficult to exploit. However, an exploit is publicly available.


How can this vulnerability impact me? :

The impact of this vulnerability is improper authorization, which could allow an attacker to access user position data without proper permissions. Although the attack complexity is high and exploitation is difficult, the availability of a public exploit increases the risk. This could lead to unauthorized disclosure of sensitive information related to user positions within the system.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability causes unauthorized cross-tenant disclosure of sensitive personnel information, including user IDs, usernames, real names, and department affiliations. Such exposure violates privacy and data protection regulations like GDPR and HIPAA by failing to protect personal and organizational data from unauthorized access. The leakage of personally identifiable information (PII) and organizational details can lead to non-compliance with these standards, increasing the risk of legal and regulatory penalties. [1, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring and analyzing API requests to the endpoint GET /sys/position/getPositionUserList for unauthorized or suspicious access patterns, such as queries with positionId values that do not belong to the authenticated user's tenant. Detection can include enabling audit logging of all position member queries and monitoring for abnormal access patterns like excessive queries across many positions. A practical detection approach is to capture and inspect HTTP GET requests to the endpoint, looking for positionId parameters that may indicate cross-tenant access attempts. Example command using curl to test access (requires valid authentication token): curl -X GET 'https://<target>/sys/position/getPositionUserList?positionId=<suspected_position_id>&pageNo=1&pageSize=10' -H 'Authorization: Bearer <token>' and observe if user data from other tenants is returned. Additionally, network monitoring tools can be used to detect unusual API usage patterns targeting this endpoint. [1, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing tenant ownership validation by verifying that the requested positionId belongs to the current user's tenant before processing the request. This can be done by checking the tenantId of the position against the tenantId of the authenticated user and denying access if they do not match. Additionally, enforce tenant filtering in the service layer to ensure only data belonging to the current tenant is returned. Apply data desensitization techniques to sensitive user information, restrict access to authorized roles such as HR administrators or department heads, and enable audit logging to monitor and detect abnormal access patterns. If possible, update or patch JeecgBoot to a version where this vulnerability is fixed or consider replacing the affected product. [1, 3, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart