CVE-2026-7045
Severity CVSS v4.0:
MEDIUM
Type:
CWE-74
Injection
Publication date:
26/04/2026
Last modified:
27/04/2026
Description
A vulnerability was determined in baomidou dynamic-datasource 2.5.0. Affected by this vulnerability is the function DsSpelExpressionProcessor#doDetermineDatasource of the file dynamic-datasource-spring/src/main/java/com/baomidou/dynamic/datasource/processor/DsSpelExpressionProcessor.java of the component StandardEvaluationContext/SpelExpressionParser. This manipulation causes injection. The attack may be initiated remotely. Patch name: 273fcedaee984c08197c0890f14190b86ab7e0b8. It is recommended to apply a patch to fix this issue.
Impact
Base Score 4.0
5.30
Severity 4.0
MEDIUM
Base Score 3.x
6.30
Severity 3.x
MEDIUM
Base Score 2.0
6.50
Severity 2.0
MEDIUM
References to Advisories, Solutions, and Tools
- https://github.com/baomidou/dynamic-datasource/
- https://github.com/baomidou/dynamic-datasource/commit/273fcedaee984c08197c0890f14190b86ab7e0b8
- https://github.com/baomidou/dynamic-datasource/issues/766
- https://github.com/baomidou/dynamic-datasource/pull/767
- https://vuldb.com/submit/798600
- https://vuldb.com/vuln/359624
- https://vuldb.com/vuln/359624/cti



