-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stemmed from unsafe SQL parameter handling in MyBatis XML mappings. The pre-patch versions used dangerous ${userIds} interpolation in SQL IN clauses rather than safe #{} parameterization. The mapper interface methods accepted raw String inputs which were passed to these vulnerable XML mappings. The service layer's String.format() calls created comma-separated quoted values that appeared safe but were still vulnerable due to the underlying ${} interpolation in SQL templates. The commit fixed this by switching to List<String> parameters and using <foreach> with #{} in XML.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jeecgframework.boot:jeecg-boot-common | maven | < 3.4.4 | 3.4.4 |