Cyber Posture

CVE-2026-2555

MediumPublic PoC

Published: 16 February 2026

Published
16 February 2026
Modified
18 February 2026
KEV Added
Patch
CVSS Score 5.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0006 17.8th percentile
Risk Priority 10 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-2555 is a medium-severity Improper Input Validation (CWE-20) vulnerability in Jeecg Jeecg Boot. Its CVSS base score is 5.0 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 17.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as Other AI Platforms.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-20 CWE-502

Security testing and evaluation at multiple SDLC stages directly detects missing or flawed input validation, with the required remediation process ensuring fixes are applied.

addresses: CWE-20 CWE-502

Directly implements checks on information inputs to reject invalid data before processing.

addresses: CWE-502

Penetration testing supplies malicious serialized objects, detecting unsafe deserialization and supporting corrective actions.

addresses: CWE-20

Security testing and developer training directly verify and enforce proper input validation, reducing exploitability of injection and malformed-data weaknesses.

addresses: CWE-502

Untrusted serialized data can be deserialized and observed inside the chamber, blocking gadget-chain exploitation outside the sandbox.

addresses: CWE-502

Identifies and blocks malicious code introduced through deserialization of untrusted data at system boundaries.

addresses: CWE-502

Integrity verification of serialized information can detect tampering before deserialization occurs.

addresses: CWE-20

Spam protection mechanisms perform filtering and detection on inbound/outbound messages, directly compensating for missing or weak input validation of unsolicited content.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Deserialization of untrusted data (malicious ZIP) in a remotely accessible web controller directly enables exploitation of the application for RCE (T1190); successful exploitation results in arbitrary code execution that can be performed via command/scripting interpreters (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A weakness has been identified in JeecgBoot 3.9.1. This vulnerability affects the function importDocumentFromZip of the file org/jeecg/modules/airag/llm/controller/AiragKnowledgeController.java of the component Retrieval-Augmented Generation. Executing a manipulation can lead to deserialization. The attack can be launched remotely. Attacks of this nature…

more

are highly complex. It is stated that the exploitability is difficult. The project was informed of the problem early through an issue report but has not responded yet.

Deeper analysisAI

CVE-2026-2555 is a deserialization vulnerability in JeecgBoot version 3.9.1, affecting the importDocumentFromZip function within the org/jeecg/modules/airag/llm/controller/AiragKnowledgeController.java file of the Retrieval-Augmented Generation (RAG) component. The issue stems from improper input validation (CWE-20) and deserialization of untrusted data (CWE-502), with a CVSS v3.1 base score of 5.0 (AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L). It was published on 2026-02-16.

The vulnerability can be exploited remotely by an authenticated attacker with low privileges (PR:L), though it requires high attack complexity (AC:H) and no user interaction (UI:N). Successful exploitation leads to limited impacts on confidentiality, integrity, and availability (C:L/I:L/A:L), potentially allowing arbitrary code execution or data manipulation via malicious ZIP files processed by the import function.

Advisories from VulDB indicate the project was notified early through GitHub issue #9335 in the JeecgBoot repository, but the maintainers have not yet responded or released patches. No specific mitigations are detailed in the available references.

This vulnerability is notable for its presence in a Retrieval-Augmented Generation component, which has relevance to AI/ML workflows, and its exploitability is described as difficult due to the high complexity required. No real-world exploitation has been reported.

Details

CWE(s)

Affected Products

jeecg
jeecg boot
3.9.1

AI Security AnalysisAI

AI Category
Other AI Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: llm

CVEs Like This One

CVE-2025-14908Same product: Jeecg Jeecg Boot
CVE-2024-40489Same product: Jeecg Jeecg Boot
CVE-2026-1746Same product: Jeecg Jeecg Boot
CVE-2026-2822Same product: Jeecg Jeecg Boot
CVE-2024-43028Same product: Jeecg Jeecg Boot
CVE-2025-14909Same product: Jeecg Jeecg Boot
CVE-2026-3452Shared CWE-502
CVE-2025-66913Same vendor: Jeecg
CVE-2026-5536Shared CWE-20, CWE-502
CVE-2025-23006Shared CWE-502

References