CVE-2026-3404

A flaw has been found in thinkgem JeeSite up to 5.15.1. Impacted is an unknown function of the file /com/jeesite/common/shiro/cas/CasOutHandler.java of the component Endpoint. Executing a manipulation can lead to xml external entity reference. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://vuldb.com/?ctiid.348299 Permissions Required VDB Entry
https://vuldb.com/?id.348299 Third Party Advisory VDB Entry
https://vuldb.com/?submit.763732 Third Party Advisory VDB Entry
https://www.yuque.com/la12138/pa2fpb/ew8x2qss8dv0bsu0?singleDoc Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jeesite:jeesite:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-02 02:16

Updated : 2026-03-09 16:52


NVD link : CVE-2026-3404

Mitre link : CVE-2026-3404

CVE.ORG link : CVE-2026-3404


JSON object : View

Products Affected

jeesite

  • jeesite
CWE
CWE-610

Externally Controlled Reference to a Resource in Another Sphere

CWE-611

Improper Restriction of XML External Entity Reference