CVE-2026-8196
Received Received - Intake
Authorization Bypass in JeecgBoot LoginController

Publication date: 2026-05-09

Last updated on: 2026-05-09

Assigner: VulDB

Description
A flaw has been found in JeecgBoot 3.9.1. The impacted element is an unknown function of the file jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/controller/LoginController.java of the component mLogin Endpoint. This manipulation causes authorization bypass. The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitability is regarded as difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-09
Last Modified
2026-05-09
Generated
2026-05-10
AI Q&A
2026-05-10
EPSS Evaluated
N/A
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
jeecg jeecgboot 3.9.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a flaw found in JeecgBoot version 3.9.1, specifically in an unknown function within the LoginController.java file of the mLogin Endpoint component. It allows an attacker to bypass authorization controls.

The attack can be performed remotely but is considered to have high complexity and difficult exploitability. Despite this, an exploit has been published and may be used.


How can this vulnerability impact me? :

This vulnerability can allow unauthorized users to bypass authorization mechanisms, potentially gaining access to restricted parts of the system without proper permissions.

Such unauthorized access could lead to exposure of sensitive information or unauthorized actions within the affected application.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart