Vulnerability Description
A flaw has been found in thinkgem JeeSite up to 5.15.1. Impacted is an unknown function of the file /com/jeesite/common/shiro/cas/CasOutHandler.java of the component Endpoint. Executing a manipulation can lead to xml external entity reference. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jeesite | Jeesite | <= 5.15.1 |
Related Weaknesses (CWE)
References
- https://vuldb.com/?ctiid.348299Permissions RequiredVDB Entry
- https://vuldb.com/?id.348299Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.763732Third Party AdvisoryVDB Entry
- https://www.yuque.com/la12138/pa2fpb/ew8x2qss8dv0bsu0?singleDocExploitThird Party Advisory
FAQ
What is CVE-2026-3404?
CVE-2026-3404 is a vulnerability with a CVSS score of 5.0 (MEDIUM). A flaw has been found in thinkgem JeeSite up to 5.15.1. Impacted is an unknown function of the file /com/jeesite/common/shiro/cas/CasOutHandler.java of the component Endpoint. Executing a manipulation...
How severe is CVE-2026-3404?
CVE-2026-3404 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3404?
Check the references section above for vendor advisories and patch information. Affected products include: Jeesite Jeesite.