A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
History

Mon, 29 Sep 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Guojusoft
Guojusoft jeecgboot
CPEs cpe:2.3:a:guojusoft:jeecgboot:*:*:*:*:*:*:*:*
Vendors & Products Guojusoft
Guojusoft jeecgboot

Fri, 26 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 26 Sep 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Jeecg
Jeecg jeecgboot
Vendors & Products Jeecg
Jeecg jeecgboot

Thu, 25 Sep 2025 22:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title JeecgBoot deleteBatch improper authorization
Weaknesses CWE-266
CWE-285
References
Metrics cvssV2_0

{'score': 2.1, 'vector': 'AV:N/AC:H/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.1, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-09-25T22:32:08.286Z

Updated: 2025-09-26T15:38:18.442Z

Reserved: 2025-09-25T14:20:56.882Z

Link: CVE-2025-10977

cve-icon Vulnrichment

Updated: 2025-09-26T15:37:21.501Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-25T23:15:47.630

Modified: 2025-09-29T13:06:19.820

Link: CVE-2025-10977

cve-icon Redhat

No data.