CVE-2026-2555

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to execute complex remote attacks by manipulating a function in JeecgBoot, potentially leading to unauthorized actions through deserialization of data. However, exploiting this weakness is difficult and requires specific conditions to be met.

Technical Description

A weakness has been identified in JeecgBoot 3.9.1. This vulnerability affects the function importDocumentFromZip of the file org/jeecg/modules/airag/llm/controller/AiragKnowledgeController.java of the component Retrieval-Augmented Generation. Executing a manipulation can lead to deserialization. The attack can be launched remotely. Attacks of this nature are highly complex. It is stated that the exploitability is difficult. The project was informed of the problem early through an issue report but has not responded yet.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$332($100-$500)
Vendor Response
Grade APatched in 2 days

Quick Information

Published

Feb 16, 2026

about 2 months ago

Last Modified

Feb 18, 2026

about 2 months ago

Vendor

jeecg

Product

jeecg boot