Jimureport

5 CVEs product

Monthly

CVE-2026-5848 MEDIUM POC This Month

Code injection in JimuReport's Data Source Handler allows authenticated high-privilege users to execute arbitrary code via manipulated dbUrl parameters in the DriverManager.getConnection function (versions up to 2.3.0). The vulnerability requires high-privilege authentication but can be exploited remotely with low attack complexity; publicly available exploit code exists and the vendor has acknowledged the issue with a fix planned for an upcoming release.

Java Code Injection RCE Jimureport
NVD GitHub VulDB
CVSS 4.0
5.1
EPSS
0.1%
CVE-2025-66913 CRITICAL POC Act Now

JimuReport through 2.1.3 has RCE via user-controlled H2 JDBC URLs. The application passes attacker-supplied JDBC connection strings directly to the H2 driver, which supports directives for arbitrary Java code execution. PoC available.

Java RCE Jimureport
NVD GitHub
CVSS 3.1
9.8
EPSS
0.6%
CVE-2025-10771 MEDIUM POC This Month

A vulnerability was determined in jeecgboot JimuReport up to 2.1.2. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Deserialization Jimureport
NVD GitHub VulDB
CVSS 4.0
5.3
EPSS
0.1%
CVE-2025-10770 MEDIUM POC This Month

A vulnerability was found in jeecgboot JimuReport up to 2.1.2. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Deserialization Jimureport
NVD GitHub VulDB
CVSS 4.0
5.3
EPSS
0.1%
CVE-2025-8963 MEDIUM POC This Month

A vulnerability was determined in jeecgboot JimuReport up to 2.1.1. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Deserialization Jimureport
NVD GitHub VulDB
CVSS 4.0
5.3
EPSS
0.0%
CVE-2026-5848
EPSS 0% CVSS 5.1
MEDIUM POC This Month

Code injection in JimuReport's Data Source Handler allows authenticated high-privilege users to execute arbitrary code via manipulated dbUrl parameters in the DriverManager.getConnection function (versions up to 2.3.0). The vulnerability requires high-privilege authentication but can be exploited remotely with low attack complexity; publicly available exploit code exists and the vendor has acknowledged the issue with a fix planned for an upcoming release.

Java Code Injection RCE +1
NVD GitHub VulDB
CVE-2025-66913
EPSS 1% CVSS 9.8
CRITICAL POC Act Now

JimuReport through 2.1.3 has RCE via user-controlled H2 JDBC URLs. The application passes attacker-supplied JDBC connection strings directly to the H2 driver, which supports directives for arbitrary Java code execution. PoC available.

Java RCE Jimureport
NVD GitHub
CVE-2025-10771
EPSS 0% CVSS 5.3
MEDIUM POC This Month

A vulnerability was determined in jeecgboot JimuReport up to 2.1.2. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Deserialization Jimureport
NVD GitHub VulDB
CVE-2025-10770
EPSS 0% CVSS 5.3
MEDIUM POC This Month

A vulnerability was found in jeecgboot JimuReport up to 2.1.2. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Deserialization Jimureport
NVD GitHub VulDB
CVE-2025-8963
EPSS 0% CVSS 5.3
MEDIUM POC This Month

A vulnerability was determined in jeecgboot JimuReport up to 2.1.1. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Deserialization Jimureport
NVD GitHub VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy