Sploit.io - Search

Product: j2eefast, version: 2.2

CVE-2023-2475

Severity: LOW

Description: A vulnerability was found in Dromara J2eeFAST up to 2.6.0 and classified as problematic. This issue affects some unknown processing of the component System Message Handler. The manipulation of the argument 主题 leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-227867.

CVSS Score: 3.5

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000810000
  • Percentile: 0.235720000
  • Date: 2026-04-29

ExploitDB

No data available.

HackerOne Data

  • Rank: 9222
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Dromara J2eeFAST - Versions: 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability CVE-2023-2475 is a cross-site scripting (XSS) flaw within the Dromara J2eeFAST application, specifically affecting the System Message Handler component. The vulnerability is considered LOW severity with a CVSS score of 3.5, indicating a moderate risk. The core issue lies in the improper handling of the "主题" (Subject) argument, allowing attackers to inject malicious scripts. The business impact of this vulnerability is moderate. Successful exploitation could lead to session hijacking, defacement of web pages, or redirection to malicious websites, impacting user trust and potentially exposing sensitive information. The likelihood of exploitation is moderate, as the attack is remote and requires user interaction (UI:R), but the exploit is publicly disclosed making it easier to leverage. Ease of exploitation is also moderate, requiring a logged-in user to trigger the XSS payload. The vulnerability primarily impacts confidentiality and integrity, with a limited impact on availability. Successful XSS can allow an attacker to steal cookies or redirect users, potentially compromising their session and the data they are accessing.

    2. Potential Attack Scenarios
    An attacker could craft a malicious message with a specially crafted "主题" (Subject) field containing JavaScript code. This message is then sent within the J2eeFAST application. When a logged-in user views this message, the injected JavaScript executes in their browser within the context of the J2eeFAST application. This allows the attacker to potentially steal the user’s session cookie, redirect them to a phishing page, or modify the content of the J2eeFAST application as it appears to the user. For instance, an attacker could inject a script to redirect the user to a fake login page that mimics the J2eeFAST login, capturing their credentials. Another attack scenario would involve injecting a script to steal the user’s session cookie, allowing the attacker to impersonate the user within the application. The attack vector is remote, initiated via the web interface of J2eeFAST, and requires a user to interact with the malicious message.

    3. Mitigation Recommendations
    The primary mitigation for CVE-2023-2475 is to apply the provided patch (7a9e1a00e3329fdc0ae05f7a8257cce77037134d) to the Dromara J2eeFAST application. This patch addresses the improper handling of the "主题" argument in the System Message Handler. Immediate action should be taken to deploy the patch in a timely manner. In addition, consider implementing the following best practices: input validation and output encoding. Ensure all user-supplied input is properly validated to prevent the injection of malicious scripts. Implement output encoding to ensure that any user-supplied data displayed in the web application is properly escaped, preventing it from being interpreted as executable code. Regularly review and update the J2eeFAST application and its dependencies to address any emerging vulnerabilities. Further details on the vulnerability and patch can be found at: https://vuldb.com/?id.227867 and https://gitee.com/dromara/J2EEFAST/commit/7a9e1a00e3329fdc0ae05f7a8257cce77037134d.

    4. Executive Summary
    Dromara J2eeFAST, versions 2.0 through 2.6, is affected by a cross-site scripting vulnerability (CVE-2023-2475). This allows attackers to inject malicious scripts into the System Message Handler, potentially compromising user sessions and the integrity of the application. While the vulnerability is rated as LOW severity, the publicly available exploit means it could be readily leveraged. Applying the patch 7a9e1a00e3329fdc0ae05f7a8257cce77037134d is the most effective mitigation. Prompt action is recommended to minimize the risk of session hijacking, user redirection, and potential data compromise. This vulnerability represents a moderate business risk, impacting user trust and potentially exposing sensitive information. Prioritizing the patch deployment will safeguard the application and its users from potential attack.

    CVE-2023-2476

    Severity: LOW

    Description: A vulnerability was found in Dromara J2eeFAST up to 2.6.0. It has been classified as problematic. Affected is an unknown function of the component Announcement Handler. The manipulation of the argument 系统工具/公告管理 leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-227868.

    CVSS Score: 3.5

    Priority

    D

    CISA Data

    EPSS Data

    • EPSS: 0.000810000
    • Percentile: 0.235720000
    • Date: 2026-04-29

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 9223
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • Dromara J2eeFAST - Versions: 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability in Dromara J2eeFAST, specifically within the Announcement Handler component, is a Cross-Site Scripting (XSS) issue. This allows an attacker to inject malicious scripts into web pages viewed by other users. The base CVSS score is 3.5 (LOW), indicating a moderate level of risk. The vulnerability is considered "problematic" which suggests it could lead to noticeable disruption but isn't necessarily critical. Exploitation requires a user to interact with a crafted URL or input, meaning it's not automatically exploitable. The impact is primarily on data integrity – an attacker can manipulate what a user sees or does within the application. Confidentiality and availability are less directly impacted, unless the XSS is used as a stepping stone for a more significant attack. The likelihood of exploitation is moderate, given the publicly available exploit and the relative ease of XSS attacks. The business impact could range from defacement of the application to potentially stealing user credentials or redirecting users to malicious sites, depending on the specifics of the injected script.

      2. Potential Attack Scenarios
      An attacker could craft a malicious URL containing the XSS payload in the 系统工具/公告管理 parameter. This URL could then be sent to a legitimate user via phishing email, social media, or embedded within a seemingly harmless web page. When the user clicks the link, the malicious script will execute within their browser in the context of the Dromara J2eeFAST application. The script could steal the user's session cookie, allowing the attacker to impersonate the user. Alternatively, the script could redirect the user to a phishing page designed to harvest credentials. A more visual attack could involve altering the content of the announcement to display a misleading message or deface the application with the attacker’s own branding. The attack vector is network-based, making it remotely exploitable. The attack process involves crafting the URL, delivering it to the victim, and the victim clicking the link. The potential outcome is compromised user accounts, data manipulation, or application defacement.

      3. Mitigation Recommendations
      The primary mitigation for this XSS vulnerability is to apply the patch provided by Dromara: 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. This patch should be applied to all affected versions of Dromara J2eeFAST (2.0 through 2.6.0). In addition to patching, input validation and output encoding should be implemented within the Announcement Handler component to sanitize user input and ensure that any dynamically generated HTML is properly encoded to prevent script execution. Web application firewalls (WAFs) can also be configured to detect and block XSS attacks. Regularly scan the application with a vulnerability scanner to identify any new or emerging vulnerabilities. The following resources are helpful: VulDB vulnerability details: https://vuldb.com/?id.227868, Gitee issue tracker: https://gitee.com/dromara/J2EEFAST/issues/I6W380, and the patch commit: https://gitee.com/dromara/J2EEFAST/commit/7a9e1a00e3329fdc0ae05f7a8257cce77037134d.

      4. Executive Summary
      Dromara J2eeFAST contains a Cross-Site Scripting (XSS) vulnerability that could allow attackers to inject malicious scripts into web pages viewed by users. While the vulnerability is rated as low severity, it could lead to compromised user accounts, data manipulation, or application defacement. The vulnerability exists within the Announcement Handler component and affects versions 2.0 through 2.6.0. A patch is available and should be applied as soon as possible. This issue is publicly known and exploitable, meaning attackers may actively target systems running vulnerable versions of Dromara J2eeFAST. Addressing this vulnerability is important to maintain the integrity of the application and protect user data and trust. Prompt patching and implementation of input validation will minimize the risk of a successful attack.