CVE-2024-43028
Published: 01 April 2026
Summary
CVE-2024-43028 is a critical-severity Command Injection (CWE-77) vulnerability in Jeecg Jeecg Boot. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 25.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2024-43028 by identifying, prioritizing, and applying patches or workarounds for the command injection flaw in Jeecg Boot's /jmreport/show component.
Prevents command injection exploitation by validating and sanitizing untrusted HTTP inputs to the vulnerable /jmreport/show endpoint.
Enforces authentication and authorization requirements to block unauthenticated remote access to the vulnerable /jmreport/show component.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated command injection in public-facing web component enables remote exploitation (T1190) leading to arbitrary OS command execution via Unix Shell (T1059.004).
NVD Description
A command injection vulnerability in the component /jmreport/show of jeecg boot v3.0.0 to v3.5.3 allows attackers to execute arbitrary code via a crafted HTTP request.
Deeper analysisAI
CVE-2024-43028 is a command injection vulnerability (CWE-77) affecting the /jmreport/show component in Jeecg Boot versions 3.0.0 through 3.5.3. It enables attackers to execute arbitrary code by sending a crafted HTTP request to the vulnerable endpoint. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact remote exploitation.
Unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants remote code execution on the affected server, potentially allowing full system compromise, data theft, or further lateral movement within the environment.
Mitigation details and additional technical information are available in the referenced advisories, including a GitHub Gist at https://gist.github.com/aqyoung/e3b7ba5d8b8261df7d09931dbe779b3b and a Baidu Pan share at https://pan.baidu.com/s/1h2RGEvxuvsKtsn2-TlFlmA?pwd=gf5r. Security practitioners should review these for patch availability or workarounds specific to Jeecg Boot deployments.
Details
- CWE(s)