Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-32041 | Jeecgboot versions 3.8.2 and earlier are affected by a path traversal vulnerability. This vulnerability allows attackers to upload files with system-whitelisted extensions to the system directory /opt, instead of the /opt/upFiles directory specified by the web server. |
| Link | Providers |
|---|---|
| https://github.com/jeecgboot/JeecgBoot/issues/8826 |
|
Tue, 07 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jeecg jeecg Boot
|
|
| CPEs | cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Jeecg jeecg Boot
|
Thu, 02 Oct 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jeecg
Jeecg jeecgboot |
|
| Vendors & Products |
Jeecg
Jeecg jeecgboot |
Wed, 01 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-24 | |
| Metrics |
cvssV3_1
|
Wed, 01 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jeecgboot versions 3.8.2 and earlier are affected by a path traversal vulnerability. This vulnerability allows attackers to upload files with system-whitelisted extensions to the system directory /opt, instead of the /opt/upFiles directory specified by the web server. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-01T20:19:14.279Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61188
Updated: 2025-10-01T20:19:09.392Z
Status : Analyzed
Published: 2025-10-01T20:18:38.980
Modified: 2025-10-07T14:43:33.480
Link: CVE-2025-61188
No data.
OpenCVE Enrichment
Updated: 2025-10-02T08:45:52Z
EUVD