CVE-2026-7605
Server-Side Request Forgery in JeecgBoot
Publication date: 2026-05-02
Last updated on: 2026-05-05
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jeecgboot | jeecgboot | to 3.9.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-7605 is a Server-Side Request Forgery (SSRF) vulnerability in the JeecgBoot framework versions up to 3.9.1. It exists in the /sys/common/uploadImgByHttp endpoint, where the application takes a user-controlled URL parameter (fileUrl) from a JSON request and performs an outbound HTTP request without validating the URL beforehand.
The vulnerability arises because the server downloads the external resource before performing any security checks on the file type, allowing an authenticated attacker to force the server to fetch arbitrary internal or external resources.
This flaw affects the CommonController.java and HttpFileToMultipartFileUtil.java components, specifically the downloadImageData function, which executes HTTP requests without protections like IP restrictions, URL whitelisting, or protocol validation.
How can this vulnerability impact me? :
This SSRF vulnerability can be exploited by an attacker to make the server perform unauthorized HTTP requests to internal or external systems.
- Internal network scanning and service enumeration, potentially revealing sensitive infrastructure details.
- Accessing sensitive cloud metadata services, which may expose credentials or other confidential information.
- Potentially stealing sensitive data or causing unauthorized interactions with internal services.
Since the exploit is publicly available, attackers can remotely initiate these attacks, increasing the risk of compromise.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for POST requests to the endpoint `/sys/common/uploadImgByHttp` that include a `fileUrl` parameter in the JSON body. Anomalous or unexpected outbound HTTP requests initiated by the server to internal or external URLs, especially those targeting internal network resources or cloud metadata services, may indicate exploitation attempts.
To detect potential exploitation, you can inspect web server logs or use network monitoring tools to identify such POST requests and the resulting outbound connections.
- Use tools like `curl` or `httpie` to simulate requests and observe server behavior, e.g.:
- curl -X POST https://yourserver/sys/common/uploadImgByHttp -H "Content-Type: application/json" -d '{"fileUrl":"http://169.254.169.254/latest/meta-data/"}'
- Check server logs for outbound HTTP requests triggered by such inputs.
- Use network monitoring tools (e.g., tcpdump, Wireshark) to capture outbound HTTP traffic from the server to suspicious internal IPs or metadata service IPs.
What immediate steps should I take to mitigate this vulnerability?
The immediate recommended step is to upgrade JeecgBoot to a version where this vulnerability is fixed once the vendor releases the patch.
Until an official fix is available, you should consider implementing the following mitigations:
- Restrict access to the vulnerable endpoint `/sys/common/uploadImgByHttp` to trusted users only, as the vulnerability requires authentication.
- Implement network-level restrictions to prevent the server from making outbound HTTP requests to internal IP ranges or sensitive metadata service IPs.
- Add input validation or filtering on the `fileUrl` parameter to block requests containing internal or suspicious URLs.
- Monitor logs and network traffic for signs of exploitation attempts.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in JeecgBoot (CVE-2026-7605) is a server-side request forgery (SSRF) flaw that allows an attacker to make the server fetch arbitrary internal or external resources without proper validation. This can lead to exposure of sensitive data such as internal service information or cloud metadata credentials.
Such exposure of sensitive data can potentially impact compliance with data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive information from unauthorized access or disclosure.
Because the vulnerability allows unauthorized internal network scanning and data exposure, organizations using affected versions of JeecgBoot may face increased risk of data breaches or unauthorized data access, which could lead to non-compliance with these standards.
Mitigating this vulnerability by upgrading the affected component is recommended to maintain compliance and reduce the risk of data exposure.