Vulnerability Description
A vulnerability, which was classified as problematic, was found in thinkgem JeeSite up to 5.12.0. Affected is the function select of the file src/main/java/com/jeesite/modules/cms/web/SiteController.java of the component Site Controller. The manipulation of the argument redirect leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 3d06b8d009d0267f0255acc87ea19d29d07cedc3. It is recommended to apply a patch to fix this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jeesite | Jeesite | < 5.12.1 |
Related Weaknesses (CWE)
References
- https://github.com/thinkgem/jeesite5/commit/3d06b8d009d0267f0255acc87ea19d29d07cPatch
- https://github.com/thinkgem/jeesite5/issues/28ExploitIssue Tracking
- https://github.com/thinkgem/jeesite5/issues/28#issuecomment-3045862239Issue Tracking
- https://vuldb.com/?ctiid.316758Permissions RequiredVDB Entry
- https://vuldb.com/?id.316758Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.616103Third Party AdvisoryVDB Entry
- https://github.com/thinkgem/jeesite5/issues/28ExploitIssue Tracking
- https://github.com/thinkgem/jeesite5/issues/28#issuecomment-3045862239Issue Tracking
FAQ
What is CVE-2025-7763?
CVE-2025-7763 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A vulnerability, which was classified as problematic, was found in thinkgem JeeSite up to 5.12.0. Affected is the function select of the file src/main/java/com/jeesite/modules/cms/web/SiteController.j...
How severe is CVE-2025-7763?
CVE-2025-7763 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-7763?
Check the references section above for vendor advisories and patch information. Affected products include: Jeesite Jeesite.