JimuReport thru version 2.1.3 is vulnerable to remote code execution when processing user-controlled H2 JDBC URLs. The application passes the attacker-supplied JDBC URL directly to the H2 driver, allowing the use of certain directives to execute arbitrary Java code. A different vulnerability than CVE-2025-10770.
References
| Link | Resource |
|---|---|
| https://gist.github.com/Catherines77/f15d53e9705b24cf018e5bffed3e8234 | Third Party Advisory |
| https://github.com/jeecgboot/jimureport/issues/4306 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-08 20:15
Updated : 2026-01-30 01:06
NVD link : CVE-2025-66913
Mitre link : CVE-2025-66913
CVE.ORG link : CVE-2025-66913
JSON object : View
Products Affected
jeecg
- jimureport
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
