CVE-2026-8196
Authorization Bypass in JeecgBoot LoginController
Publication date: 2026-05-09
Last updated on: 2026-05-09
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jeecg | jeecgboot | 3.9.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a flaw found in JeecgBoot version 3.9.1, specifically in an unknown function within the LoginController.java file of the mLogin Endpoint component. It allows an attacker to bypass authorization controls.
The attack can be performed remotely but is considered to have high complexity and difficult exploitability. Despite this, an exploit has been published and may be used.
How can this vulnerability impact me? :
This vulnerability can allow unauthorized users to bypass authorization mechanisms, potentially gaining access to restricted parts of the system without proper permissions.
Such unauthorized access could lead to exposure of sensitive information or unauthorized actions within the affected application.