Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jeecg
Jeecg jimureport |
|
| Vendors & Products |
Jeecg
Jeecg jimureport |
Thu, 08 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
cvssV3_1
|
Thu, 08 Jan 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | JimuReport thru version 2.1.3 is vulnerable to remote code execution when processing user-controlled H2 JDBC URLs. The application passes the attacker-supplied JDBC URL directly to the H2 driver, allowing the use of certain directives to execute arbitrary Java code. A different vulnerability than CVE-2025-10770. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-08T19:44:30.895Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-66913
Updated: 2026-01-08T19:43:43.048Z
Status : Awaiting Analysis
Published: 2026-01-08T20:15:44.500
Modified: 2026-01-13T14:03:46.203
Link: CVE-2025-66913
No data.
OpenCVE Enrichment
Updated: 2026-01-12T14:38:19Z