Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10090: SQL Injection in Jinher OA

0
Medium
VulnerabilityCVE-2025-10090cvecve-2025-10090
Published: Mon Sep 08 2025 (09/08/2025, 09:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Jinher
Product: OA

Description

A flaw has been found in Jinher OA up to 1.2. The impacted element is an unknown function of the file /C6/Jhsoft.Web.departments/GetTreeDate.aspx. Executing manipulation of the argument ID can lead to sql injection. The attack may be launched remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 09/08/2025, 10:01:31 UTC

Technical Analysis

CVE-2025-10090 is a SQL Injection vulnerability identified in Jinher OA versions up to 1.2. The vulnerability resides in an unspecified function within the file /C6/Jhsoft.Web.departments/GetTreeDate.aspx. Specifically, the flaw allows an attacker to manipulate the 'ID' argument in a way that leads to SQL Injection, enabling unauthorized database queries. The attack vector is remote and does not require any authentication or user interaction, making exploitation straightforward. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity. The CVSS vector indicates that the attack can be performed over the network (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is low, suggesting limited but non-negligible data exposure or modification potential. Although no public exploits are currently known in the wild, proof-of-concept code has been published, increasing the risk of exploitation. Jinher OA is an office automation software product, likely used by organizations for internal management and workflow automation. The vulnerability could allow attackers to extract sensitive information from the backend database or modify data, potentially disrupting business processes or leaking confidential organizational data.

Potential Impact

For European organizations using Jinher OA versions 1.0 to 1.2, this vulnerability poses a moderate risk. Successful exploitation could lead to unauthorized access to internal databases, potentially exposing sensitive employee, operational, or customer data. While the impact on availability is low, data integrity and confidentiality could be compromised, affecting trust and compliance with data protection regulations such as GDPR. The lack of required authentication means attackers can exploit this remotely without prior access, increasing exposure. Organizations in sectors with high regulatory scrutiny or handling sensitive information (e.g., finance, healthcare, government) may face reputational damage and legal consequences if exploited. Additionally, the presence of published exploit code could accelerate attack attempts, especially targeting unpatched systems. However, the medium severity and low impact ratings suggest that the vulnerability is unlikely to cause widespread disruption or critical system failures but should still be addressed promptly to avoid data breaches.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately identify and inventory all instances of Jinher OA versions 1.0, 1.1, and 1.2 in their environment. Since no official patches are currently linked, organizations should contact Jinher for security updates or advisories. In the interim, implement web application firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the /C6/Jhsoft.Web.departments/GetTreeDate.aspx endpoint, specifically monitoring the 'ID' parameter. Conduct thorough input validation and sanitization on all user-supplied inputs, particularly the 'ID' argument, to prevent injection attacks. Employ database least privilege principles to limit the impact of any successful injection. Regularly monitor logs for anomalous queries or access patterns. Additionally, consider network segmentation to isolate the OA system from critical infrastructure and restrict external access where possible. Finally, prepare incident response plans to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-08T04:57:52.431Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bea5eed5a2966cfc7e3a7b

Added to database: 9/8/2025, 9:46:22 AM

Last enriched: 9/8/2025, 10:01:31 AM

Last updated: 10/21/2025, 8:40:59 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2025-62641: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Oct 21 2025

CVE-2025-62592: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. in Oracle Corporation Oracle VM VirtualBox

Medium
VulnerabilityTue Oct 21 2025

CVE-2025-62591: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. in Oracle Corporation Oracle VM VirtualBox

Medium
VulnerabilityTue Oct 21 2025

CVE-2025-62590: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Oct 21 2025

CVE-2025-62589: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Oct 21 2025

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats