Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 30 Jan 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:jeecg:jimureport:*:*:*:*:*:*:*:* |
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jeecg
Jeecg jimureport |
|
| Vendors & Products |
Jeecg
Jeecg jimureport |
Thu, 08 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
cvssV3_1
|
Thu, 08 Jan 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | JimuReport thru version 2.1.3 is vulnerable to remote code execution when processing user-controlled H2 JDBC URLs. The application passes the attacker-supplied JDBC URL directly to the H2 driver, allowing the use of certain directives to execute arbitrary Java code. A different vulnerability than CVE-2025-10770. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-08T19:44:30.895Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-66913
Updated: 2026-01-08T19:43:43.048Z
Status : Analyzed
Published: 2026-01-08T20:15:44.500
Modified: 2026-01-30T01:06:25.553
Link: CVE-2025-66913
No data.
OpenCVE Enrichment
Updated: 2026-01-12T14:38:19Z