A vulnerability was found in thinkgem JeeSite up to 5.12.0. It has been declared as problematic. This vulnerability affects the function xssFilter of the file src/main/java/com/jeesite/common/codec/EncodeUtils.java of the component XSS Filter. The manipulation of the argument text leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 3585737d21fe490ff6948d913fcbd8d99c41fc08. It is recommended to apply a patch to fix this issue.
References
| Link | Resource |
|---|---|
| https://github.com/thinkgem/jeesite5/commit/3585737d21fe490ff6948d913fcbd8d99c41fc08 | Patch |
| https://github.com/thinkgem/jeesite5/issues/32 | Exploit Issue Tracking |
| https://github.com/thinkgem/jeesite5/issues/32#issuecomment-3051177029 | Issue Tracking |
| https://vuldb.com/?ctiid.316978 | Permissions Required VDB Entry |
| https://vuldb.com/?id.316978 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.618190 | Third Party Advisory VDB Entry |
| https://github.com/thinkgem/jeesite5/issues/32 | Exploit Issue Tracking |
Configurations
History
No history.
Information
Published : 2025-07-20 04:15
Updated : 2025-08-25 17:23
NVD link : CVE-2025-7865
Mitre link : CVE-2025-7865
CVE.ORG link : CVE-2025-7865
JSON object : View
Products Affected
jeesite
- jeesite
