CVE-2025-11035: XML External Entity Reference in Jinher OA
A vulnerability was determined in Jinher OA 2.0. The impacted element is an unknown function of the file /c6/Jhsoft.Web.module/ToolBar/ManageWord.aspx/?text=GetUrl&style=1. This manipulation causes xml external entity reference. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-11035 is a medium-severity XML External Entity (XXE) vulnerability identified in Jinher OA version 2.0, specifically within an unknown function in the file /c6/Jhsoft.Web.module/ToolBar/ManageWord.aspx/?text=GetUrl&style=1. The vulnerability arises from improper handling of XML input, allowing an attacker to manipulate XML external entity references. This flaw can be exploited remotely without requiring user interaction or elevated privileges, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:L/UI:N). The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L/VI:L/VA:L), suggesting partial data disclosure or modification and potential service disruption. The vulnerability has been publicly disclosed but no known exploits are currently observed in the wild. The root cause is the unsafe processing of XML data that allows external entity references, which can lead to sensitive file disclosure, server-side request forgery (SSRF), or denial of service (DoS) attacks depending on the attacker’s payload. The affected product, Jinher OA, is an office automation system used for enterprise resource planning and workflow management, implying that exploitation could expose sensitive organizational data or disrupt business processes. The lack of available patches or mitigation links indicates that organizations must proactively implement defensive measures until an official fix is released.
Potential Impact
For European organizations using Jinher OA 2.0, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized disclosure of sensitive internal documents or configuration files, potentially exposing confidential business information or user credentials. Additionally, attackers might leverage the vulnerability to perform SSRF attacks, pivoting into internal networks or accessing restricted resources. The partial impact on integrity and availability could disrupt workflow automation, causing operational delays or data inconsistencies. Given the remote exploitability without user interaction, attackers could automate attacks at scale, increasing risk exposure. Organizations in regulated sectors such as finance, healthcare, or government may face compliance issues if sensitive data is leaked. The absence of known active exploitation reduces immediate risk but does not eliminate the threat, especially as exploit code may become available following public disclosure.
Mitigation Recommendations
European organizations should immediately audit their Jinher OA 2.0 deployments to identify vulnerable instances. Until an official patch is available, it is critical to implement network-level protections such as web application firewalls (WAFs) configured to detect and block XML external entity payloads and suspicious XML content. Disabling XML external entity processing in the application’s XML parsers, if configurable, is a strong mitigation step. Restricting outbound network connectivity from the Jinher OA server can limit SSRF impact. Monitoring application logs for unusual XML parsing errors or unexpected external entity requests can provide early detection. Organizations should also segment the Jinher OA servers from sensitive internal networks to reduce lateral movement risk. Finally, maintain close communication with the vendor for patch releases and apply updates promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-11035: XML External Entity Reference in Jinher OA
Description
A vulnerability was determined in Jinher OA 2.0. The impacted element is an unknown function of the file /c6/Jhsoft.Web.module/ToolBar/ManageWord.aspx/?text=GetUrl&style=1. This manipulation causes xml external entity reference. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-11035 is a medium-severity XML External Entity (XXE) vulnerability identified in Jinher OA version 2.0, specifically within an unknown function in the file /c6/Jhsoft.Web.module/ToolBar/ManageWord.aspx/?text=GetUrl&style=1. The vulnerability arises from improper handling of XML input, allowing an attacker to manipulate XML external entity references. This flaw can be exploited remotely without requiring user interaction or elevated privileges, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:L/UI:N). The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L/VI:L/VA:L), suggesting partial data disclosure or modification and potential service disruption. The vulnerability has been publicly disclosed but no known exploits are currently observed in the wild. The root cause is the unsafe processing of XML data that allows external entity references, which can lead to sensitive file disclosure, server-side request forgery (SSRF), or denial of service (DoS) attacks depending on the attacker’s payload. The affected product, Jinher OA, is an office automation system used for enterprise resource planning and workflow management, implying that exploitation could expose sensitive organizational data or disrupt business processes. The lack of available patches or mitigation links indicates that organizations must proactively implement defensive measures until an official fix is released.
Potential Impact
For European organizations using Jinher OA 2.0, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized disclosure of sensitive internal documents or configuration files, potentially exposing confidential business information or user credentials. Additionally, attackers might leverage the vulnerability to perform SSRF attacks, pivoting into internal networks or accessing restricted resources. The partial impact on integrity and availability could disrupt workflow automation, causing operational delays or data inconsistencies. Given the remote exploitability without user interaction, attackers could automate attacks at scale, increasing risk exposure. Organizations in regulated sectors such as finance, healthcare, or government may face compliance issues if sensitive data is leaked. The absence of known active exploitation reduces immediate risk but does not eliminate the threat, especially as exploit code may become available following public disclosure.
Mitigation Recommendations
European organizations should immediately audit their Jinher OA 2.0 deployments to identify vulnerable instances. Until an official patch is available, it is critical to implement network-level protections such as web application firewalls (WAFs) configured to detect and block XML external entity payloads and suspicious XML content. Disabling XML external entity processing in the application’s XML parsers, if configurable, is a strong mitigation step. Restricting outbound network connectivity from the Jinher OA server can limit SSRF impact. Monitoring application logs for unusual XML parsing errors or unexpected external entity requests can provide early detection. Organizations should also segment the Jinher OA servers from sensitive internal networks to reduce lateral movement risk. Finally, maintain close communication with the vendor for patch releases and apply updates promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-26T08:50:39.186Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d6de61d0242cefa1be041b
Added to database: 9/26/2025, 6:41:37 PM
Last enriched: 9/26/2025, 6:42:03 PM
Last updated: 9/26/2025, 7:48:47 PM
Views: 4
Actions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.