CVE-2025-12626

4.3 MEDIUM

📋 TL;DR

This CVE describes a path traversal vulnerability in jeecgboot jeewx-boot that allows attackers to manipulate the imgurl parameter to access arbitrary files on the server. The vulnerability affects all versions up to commit 641ab52c3e1845fec39996d7794c33fb40dad1dd, and remote exploitation is possible without authentication.

💻 Affected Systems

Products:
  • jeecgboot jeewx-boot
Versions: All versions up to commit 641ab52c3e1845fec39996d7794c33fb40dad1dd
Operating Systems: All platforms running Java
Default Config Vulnerable: ⚠️ Yes
Notes: This product follows rolling releases, so specific version numbers are not provided. The vulnerability affects the getImgUrl function in WxActGoldeneggsPrizesController.java.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, or source code, potentially leading to credential theft, system compromise, or further exploitation.

🟠

Likely Case

Unauthorized file disclosure including configuration files, logs, or application data stored in accessible directories.

🟢

If Mitigated

Limited to reading files within the application's directory structure if proper file permissions are enforced.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit has been released publicly and can be evaded with additional encoding despite initial fixes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after commit 641ab52c3e1845fec39996d7794c33fb40dad1dd

Vendor Advisory: https://github.com/jeecgboot/jeewx-boot/issues/17

Restart Required: Yes

Instructions:

1. Update to the latest version from the official GitHub repository. 2. Ensure the fix properly validates and sanitizes the imgurl parameter. 3. Restart the application server.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to reject imgurl parameters containing path traversal sequences

Implement input validation in WxActGoldeneggsPrizesController.java to filter '../', '..\\', and encoded variations

Web Application Firewall Rule

all

Block requests containing path traversal patterns in the imgurl parameter

Configure WAF to block requests with '../', '..\\', URL-encoded traversal sequences in query parameters

🧯 If You Can't Patch

  • Implement strict file system permissions to limit what files the application user can access
  • Deploy a reverse proxy or WAF to filter malicious requests before they reach the application

🔍 How to Verify

Check if Vulnerable:

Test by sending a request with imgurl parameter containing path traversal sequences like '../../etc/passwd' to the affected endpoint

Check Version:

Check git commit hash: git log --oneline -1

Verify Fix Applied:

Verify that path traversal attempts return error responses or sanitized paths instead of file contents

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with imgurl parameter containing '../', '..\\', or encoded variations
  • Unusual file access patterns from the application

Network Indicators:

  • HTTP requests to the affected endpoint with suspicious imgurl parameters
  • Unusual outbound file transfers

SIEM Query:

source="application.log" AND (imgurl="*../*" OR imgurl="*..\\*")

🔗 References

📤 Share & Export