CVE-2025-9796
A vulnerability was found in thinkgem JeeSite up to 5.12.1. This affects the function decodeUrl2 of the file common/src/main/java/com/jeesite/common/codec/EncodeUtils.java. The manipulation results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 5.13.0 mitigates this issue. The patch is identified as 63773c97a56bdb3649510e83b66c16db4754965b. Upgrading the affected component is recommended.
Vendor
Product
CWE
Yayın Tarihi
2025-09-01 22:15:30
Güncelleme
2025-09-04 16:54:57
Source Identifier
cna@vuldb.com
KEV Date Added
-
Kategoriler
Referanslar
https://github.com/thinkgem/jeesite5/commit/63773c97a56bdb3649510e83b66c16db4754965b
https://github.com/thinkgem/jeesite5/issues/33
https://github.com/thinkgem/jeesite5/issues/33#issue-3330107533
https://github.com/thinkgem/jeesite5/issues/33#issuecomment-3197374560
https://github.com/thinkgem/jeesite5/releases/tag/v5.13.0.springboo3
https://vuldb.com/?ctiid.322111
https://vuldb.com/?id.322111
https://vuldb.com/?submit.641125
https://github.com/thinkgem/jeesite5/issues/33
https://github.com/thinkgem/jeesite5/issues/33#issue-3330107533
https://github.com/thinkgem/jeesite5/issues/33#issuecomment-3197374560