{"id":"CVE-2023-41544","details":"SSTI injection vulnerability in jeecg-boot version 3.5.3, allows remote attackers to execute arbitrary code via crafted HTTP request to the /jmreport/loadTableData component.","aliases":["GHSA-49jp-cghc-p5pj"],"modified":"2026-04-10T05:01:14.198673Z","published":"2023-12-30T04:15:08.250Z","references":[{"type":"EVIDENCE","url":"https://pho3n1x-web.github.io/2023/09/18/CVE-2023-41544%28JeecgBoot_SSTI%29/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jeecgboot/jeecg-boot","events":[{"introduced":"0"},{"last_affected":"7167668c2a6cf5a181e73ff6ad9714842a36cd7c"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.5.3"}]}}],"versions":["2.2.0","2.3.0","2.4.0","2.4.1","2.4.5","v2.0.2","v2.1.0","v2.1.1","v2.1.3","v2.1.4","v2.2.1","v2.3","v2.3.0","v2.4.1","v2.4.2","v2.4.3","v2.4.5","v2.4.6","v3.0","v3.0.0","v3.1.0","v3.2.0","v3.4.0","v3.4.2","v3.4.3","v3.4.3last","v3.4.4","v3.4.4last","v3.5.0","v3.5.1","v3.5.1last","v3.5.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-41544.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}