Submit #765093: Jeecgboot 3.9.1 SQL Injectioninfo

TitleJeecgboot 3.9.1 SQL Injection
DescriptionA logic flaw exists in the WAF's SQL injection detection mechanism, allowing attackers to bypass keyword filtering and execute arbitrary SQL queries. The vulnerability stems from a poorly constructed regular expression designed to detect SQL keywords and an asymmetric validation logic that fails to properly sanitize matched substrings.
Source⚠️ https://www.yuque.com/la12138/pa2fpb/ab1i8wyeeg1zzgq5?singleDoc
User
 Saul1213 (UID 94577)
Submission02/21/2026 13:26 (1 month ago)
Moderation03/06/2026 21:58 (13 days later)
StatusAccepted
VulDB entry349569 [JeecgBoot up to 3.9.1 getDictItems isExistSqlInjectKeyword sql injection]
Points18

Do you know our Splunk app?

Download it now for free!