VYPR
Critical severityNVD Advisory· Published Mar 31, 2023· Updated Feb 11, 2025

jeecg-boot API Documentation improper authentication

CVE-2023-1784

Description

A vulnerability was found in jeecg-boot 3.5.0 and classified as critical. This issue affects some unknown processing of the component API Documentation. The manipulation leads to improper authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224699.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated remote attacker can access API documentation in JeecgBoot 3.5.0 due to missing authentication, leading to information disclosure.

JeecgBoot 3.5.0, an open-source low-code platform, contains a critical authentication bypass vulnerability in its API documentation component. The root cause is improper authentication handling when accessing the API documentation functionality, allowing unauthorized requests to reach protected endpoints. This issue affects the specific version 3.5.0 [1][2].

Attackers can exploit this vulnerability remotely without any prior authentication or special privileges. By sending crafted requests to the API documentation endpoint, an unauthenticated remote attacker can bypass access controls and retrieve sensitive information from the API docs. The exploit technique has been publicly disclosed, increasing the risk of active exploitation [2].

The impact of successful exploitation includes unauthorized access to API documentation, which may reveal internal API endpoints, request/response schemas, and other implementation details. This information disclosure can serve as a stepping stone for further attacks, such as identifying vulnerable API routes or crafting more targeted exploits. Critical severity assigned to this vulnerability reflects the ease of exploitation and potential for information leakage [1][2].

JeecgBoot has not released a specific patch version for this CVE in the referenced advisory, though the platform currently ships version 3.9.2 (as of April 2026). Users running version 3.5.0 should upgrade to the latest release or implement access controls on the API documentation component until a fix is available. Organizations should assess their exposure given the public exploit availability [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jeecgframework.boot:jeecg-boot-parentMaven
<= 3.5.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.