No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jeecg
Jeecg jeecgboot |
|
| Vendors & Products |
Jeecg
Jeecg jeecgboot |
Sat, 09 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in JeecgBoot 3.9.1. The impacted element is an unknown function of the file jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/controller/LoginController.java of the component mLogin Endpoint. This manipulation causes authorization bypass. The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitability is regarded as difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | JeecgBoot mLogin Endpoint LoginController.java authorization | |
| Weaknesses | CWE-285 CWE-639 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-11T16:01:32.052Z
Reserved: 2026-05-08T20:14:24.163Z
Link: CVE-2026-8196
Updated: 2026-05-11T15:59:29.506Z
Status : Deferred
Published: 2026-05-09T21:16:26.793
Modified: 2026-05-11T15:11:48.807
Link: CVE-2026-8196
No data.
OpenCVE Enrichment
Updated: 2026-05-10T20:00:05Z