Security for everyone

CVE-2023-34659 Scanner

Detects 'SQL Injection (SQLi)' vulnerability in JeecgBoot affects v. 3.5.0 and 3.5.1.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4



JeecgBoot is a popular Java open-source framework that allows developers to create enterprise-level applications quickly and efficiently. The framework provides various features, such as code generation, security, workflow, and ORM support. JeecgBoot is widely used for web application development, including e-commerce, CMS, and finance management systems.

However, the security of JeecgBoot has been compromised by a critical vulnerability recently found by security experts. The CVE-2023-34659 vulnerability exposes an SQL injection flaw in the JeecgBoot code. The vulnerability is triggered by an insecure parameter received by the /jeecg-boot/jmreport/show interface, allowing an attacker to execute malicious SQL queries.

This vulnerability can lead to devastating consequences for businesses and organizations. Once exploited, an attacker can extract sensitive data, such as customer information, financial records, and intellectual property. Moreover, an attacker can execute arbitrary code on the server, leading to system compromise, data loss, and privacy violations.

At, we are committed to helping organizations protect their digital assets from cyber threats. Our pro features provide comprehensive vulnerability intelligence, threat analysis, and risk management tools to identify and mitigate vulnerabilities in real-time. By using our platform, readers of this article can gain valuable insights into their security posture and take proactive measures to safeguard their systems and data.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture