CVE-2025-12626
📋 TL;DR
This CVE describes a path traversal vulnerability in jeecgboot jeewx-boot that allows attackers to manipulate the imgurl parameter to access arbitrary files on the server. The vulnerability affects all versions up to commit 641ab52c3e1845fec39996d7794c33fb40dad1dd, and remote exploitation is possible without authentication.
💻 Affected Systems
- jeecgboot jeewx-boot
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive system files, configuration files, or source code, potentially leading to credential theft, system compromise, or further exploitation.
Likely Case
Unauthorized file disclosure including configuration files, logs, or application data stored in accessible directories.
If Mitigated
Limited to reading files within the application's directory structure if proper file permissions are enforced.
🎯 Exploit Status
The exploit has been released publicly and can be evaded with additional encoding despite initial fixes.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after commit 641ab52c3e1845fec39996d7794c33fb40dad1dd
Vendor Advisory: https://github.com/jeecgboot/jeewx-boot/issues/17
Restart Required: Yes
Instructions:
1. Update to the latest version from the official GitHub repository. 2. Ensure the fix properly validates and sanitizes the imgurl parameter. 3. Restart the application server.
🔧 Temporary Workarounds
Input Validation Filter
allImplement server-side validation to reject imgurl parameters containing path traversal sequences
Implement input validation in WxActGoldeneggsPrizesController.java to filter '../', '..\\', and encoded variations
Web Application Firewall Rule
allBlock requests containing path traversal patterns in the imgurl parameter
Configure WAF to block requests with '../', '..\\', URL-encoded traversal sequences in query parameters
🧯 If You Can't Patch
- Implement strict file system permissions to limit what files the application user can access
- Deploy a reverse proxy or WAF to filter malicious requests before they reach the application
🔍 How to Verify
Check if Vulnerable:
Test by sending a request with imgurl parameter containing path traversal sequences like '../../etc/passwd' to the affected endpoint
Check Version:
Check git commit hash: git log --oneline -1
Verify Fix Applied:
Verify that path traversal attempts return error responses or sanitized paths instead of file contents
📡 Detection & Monitoring
Log Indicators:
- HTTP requests with imgurl parameter containing '../', '..\\', or encoded variations
- Unusual file access patterns from the application
Network Indicators:
- HTTP requests to the affected endpoint with suspicious imgurl parameters
- Unusual outbound file transfers
SIEM Query:
source="application.log" AND (imgurl="*../*" OR imgurl="*..\\*")