Cyber Posture

CVE-2024-43028

Critical

Published: 01 April 2026

Published
01 April 2026
Modified
06 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0080 74.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

A command injection vulnerability in the component /jmreport/show of jeecg boot v3.0.0 to v3.5.3 allows attackers to execute arbitrary code via a crafted HTTP request.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2024-43028 by identifying, prioritizing, and applying patches or workarounds for the command injection flaw in Jeecg Boot's /jmreport/show component.

prevent

Prevents command injection exploitation by validating and sanitizing untrusted HTTP inputs to the vulnerable /jmreport/show endpoint.

prevent

Enforces authentication and authorization requirements to block unauthenticated remote access to the vulnerable /jmreport/show component.

Security SummaryAI

CVE-2024-43028 is a command injection vulnerability (CWE-77) affecting the /jmreport/show component in Jeecg Boot versions 3.0.0 through 3.5.3. It enables attackers to execute arbitrary code by sending a crafted HTTP request to the vulnerable endpoint. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact remote exploitation.

Unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants remote code execution on the affected server, potentially allowing full system compromise, data theft, or further lateral movement within the environment.

Mitigation details and additional technical information are available in the referenced advisories, including a GitHub Gist at https://gist.github.com/aqyoung/e3b7ba5d8b8261df7d09931dbe779b3b and a Baidu Pan share at https://pan.baidu.com/s/1h2RGEvxuvsKtsn2-TlFlmA?pwd=gf5r. Security practitioners should review these for patch availability or workarounds specific to Jeecg Boot deployments.

Details

CWE(s)

Affected Products

jeecg
jeecg boot
3.0 — 3.5.3

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Unauthenticated command injection in public-facing web component enables remote exploitation (T1190) leading to arbitrary OS command execution via Unix Shell (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References