Cyber Posture

CVE-2024-43028

CriticalRCE

Published: 01 April 2026

Published
01 April 2026
Modified
06 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0080 74.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-43028 is a critical-severity Command Injection (CWE-77) vulnerability in Jeecg Jeecg Boot. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 25.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2024-43028 by identifying, prioritizing, and applying patches or workarounds for the command injection flaw in Jeecg Boot's /jmreport/show component.

prevent

Prevents command injection exploitation by validating and sanitizing untrusted HTTP inputs to the vulnerable /jmreport/show endpoint.

prevent

Enforces authentication and authorization requirements to block unauthenticated remote access to the vulnerable /jmreport/show component.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Unauthenticated command injection in public-facing web component enables remote exploitation (T1190) leading to arbitrary OS command execution via Unix Shell (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A command injection vulnerability in the component /jmreport/show of jeecg boot v3.0.0 to v3.5.3 allows attackers to execute arbitrary code via a crafted HTTP request.

Deeper analysisAI

CVE-2024-43028 is a command injection vulnerability (CWE-77) affecting the /jmreport/show component in Jeecg Boot versions 3.0.0 through 3.5.3. It enables attackers to execute arbitrary code by sending a crafted HTTP request to the vulnerable endpoint. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact remote exploitation.

Unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants remote code execution on the affected server, potentially allowing full system compromise, data theft, or further lateral movement within the environment.

Mitigation details and additional technical information are available in the referenced advisories, including a GitHub Gist at https://gist.github.com/aqyoung/e3b7ba5d8b8261df7d09931dbe779b3b and a Baidu Pan share at https://pan.baidu.com/s/1h2RGEvxuvsKtsn2-TlFlmA?pwd=gf5r. Security practitioners should review these for patch availability or workarounds specific to Jeecg Boot deployments.

Details

CWE(s)

Affected Products

jeecg
jeecg boot
3.0 — 3.5.3

CVEs Like This One

CVE-2026-1746Same product: Jeecg Jeecg Boot
CVE-2024-40489Same product: Jeecg Jeecg Boot
CVE-2026-2822Same product: Jeecg Jeecg Boot
CVE-2025-14908Same product: Jeecg Jeecg Boot
CVE-2025-14909Same product: Jeecg Jeecg Boot
CVE-2026-2555Same product: Jeecg Jeecg Boot
CVE-2026-31175Shared CWE-77
CVE-2025-50722Shared CWE-77
CVE-2024-54007Shared CWE-77
CVE-2025-50526Shared CWE-77

References