Jeecg Vulnerabilities
Comprehensive security vulnerability database for Jeecg products
1
0
1
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-2555 | 2.3 | This vulnerability allows an attacker to execute complex remote attacks by manipulating a function in JeecgBoot, potentially leading to unauthorized actions through deserialization of data. However, exploiting this weakness is difficult and requires specific conditions to be met. | jeecgjeecg boot | Exploit Available | about 2 months agoFeb 16, 2026 |
About Jeecg Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Jeecg products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.