CVE-2025-34039: CWE-306 Missing Authentication for Critical Function in Yonyou Co., Ltd. UFIDA NC
A code injection vulnerability exists in Yonyou UFIDA NC v6.5 and prior due to the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet) without proper access controls. The servlet allows unauthenticated remote attackers to execute arbitrary Java code via the bsh.script parameter. This can be exploited to run system commands and ultimately gain full control over the target server. The issue is rooted in a third-party JAR component bundled with the application, and the servlet is accessible without authentication on vulnerable installations. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.
AI Analysis
Technical Summary
CVE-2025-34039 is a critical unauthenticated remote code execution vulnerability affecting Yonyou Co., Ltd.'s UFIDA NC product, version 6.5 and prior. The vulnerability stems from the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet), which is included as part of a third-party JAR bundled with the application. This servlet is intended for testing and debugging but is left accessible without any authentication or access control mechanisms. Attackers can exploit this by sending specially crafted HTTP requests containing malicious Java code in the bsh.script parameter. Upon processing, the servlet executes this code within the Java runtime environment, allowing arbitrary code execution on the server. This can lead to system command execution, data theft, service disruption, or full server takeover. The vulnerability is severe due to its unauthenticated nature, network accessibility, and the ability to execute arbitrary code with the privileges of the application server. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects that no privileges, user interaction, or authentication are required, and the impact on confidentiality, integrity, and availability is high. Exploitation was confirmed by Shadowserver Foundation in mid-2025, underscoring active threat potential. No patches have been published yet, increasing the urgency for mitigation.
Potential Impact
For European organizations, the impact of CVE-2025-34039 is significant. UFIDA NC is an enterprise resource planning (ERP) system widely used in various industries, including manufacturing, finance, and government sectors. Successful exploitation can lead to complete compromise of the ERP server, resulting in unauthorized access to sensitive business data, disruption of critical business processes, and potential lateral movement within corporate networks. This can cause severe operational downtime, financial losses, reputational damage, and regulatory compliance violations under GDPR due to data breaches. The ability to execute arbitrary code without authentication makes this vulnerability highly attractive to threat actors, including cybercriminals and nation-state groups. Given the critical nature of ERP systems in European enterprises, exploitation could affect supply chains and critical infrastructure. The lack of available patches increases the risk window, necessitating immediate defensive actions.
Mitigation Recommendations
1. Immediate network-level mitigation: Restrict access to the vulnerable servlet by implementing firewall rules or network segmentation to block external and unauthorized internal access to the bsh.servlet.BshServlet endpoint. 2. Disable or remove the BeanShell testing servlet from all UFIDA NC installations if not required for operations, as it is primarily intended for debugging and testing. 3. Monitor web server and application logs for any suspicious requests targeting the bsh.servlet.BshServlet or containing the bsh.script parameter. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to exploit this servlet. 5. Conduct a thorough audit of all UFIDA NC instances to identify vulnerable versions and prioritize remediation. 6. Engage with Yonyou Co., Ltd. for official patches or updates and apply them promptly once available. 7. Implement strict access controls and authentication mechanisms around management and debugging interfaces in the future to prevent similar issues. 8. Prepare incident response plans to quickly isolate and remediate compromised systems if exploitation is detected.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-34039: CWE-306 Missing Authentication for Critical Function in Yonyou Co., Ltd. UFIDA NC
Description
A code injection vulnerability exists in Yonyou UFIDA NC v6.5 and prior due to the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet) without proper access controls. The servlet allows unauthenticated remote attackers to execute arbitrary Java code via the bsh.script parameter. This can be exploited to run system commands and ultimately gain full control over the target server. The issue is rooted in a third-party JAR component bundled with the application, and the servlet is accessible without authentication on vulnerable installations. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.
AI-Powered Analysis
Technical Analysis
CVE-2025-34039 is a critical unauthenticated remote code execution vulnerability affecting Yonyou Co., Ltd.'s UFIDA NC product, version 6.5 and prior. The vulnerability stems from the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet), which is included as part of a third-party JAR bundled with the application. This servlet is intended for testing and debugging but is left accessible without any authentication or access control mechanisms. Attackers can exploit this by sending specially crafted HTTP requests containing malicious Java code in the bsh.script parameter. Upon processing, the servlet executes this code within the Java runtime environment, allowing arbitrary code execution on the server. This can lead to system command execution, data theft, service disruption, or full server takeover. The vulnerability is severe due to its unauthenticated nature, network accessibility, and the ability to execute arbitrary code with the privileges of the application server. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects that no privileges, user interaction, or authentication are required, and the impact on confidentiality, integrity, and availability is high. Exploitation was confirmed by Shadowserver Foundation in mid-2025, underscoring active threat potential. No patches have been published yet, increasing the urgency for mitigation.
Potential Impact
For European organizations, the impact of CVE-2025-34039 is significant. UFIDA NC is an enterprise resource planning (ERP) system widely used in various industries, including manufacturing, finance, and government sectors. Successful exploitation can lead to complete compromise of the ERP server, resulting in unauthorized access to sensitive business data, disruption of critical business processes, and potential lateral movement within corporate networks. This can cause severe operational downtime, financial losses, reputational damage, and regulatory compliance violations under GDPR due to data breaches. The ability to execute arbitrary code without authentication makes this vulnerability highly attractive to threat actors, including cybercriminals and nation-state groups. Given the critical nature of ERP systems in European enterprises, exploitation could affect supply chains and critical infrastructure. The lack of available patches increases the risk window, necessitating immediate defensive actions.
Mitigation Recommendations
1. Immediate network-level mitigation: Restrict access to the vulnerable servlet by implementing firewall rules or network segmentation to block external and unauthorized internal access to the bsh.servlet.BshServlet endpoint. 2. Disable or remove the BeanShell testing servlet from all UFIDA NC installations if not required for operations, as it is primarily intended for debugging and testing. 3. Monitor web server and application logs for any suspicious requests targeting the bsh.servlet.BshServlet or containing the bsh.script parameter. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to exploit this servlet. 5. Conduct a thorough audit of all UFIDA NC instances to identify vulnerable versions and prioritize remediation. 6. Engage with Yonyou Co., Ltd. for official patches or updates and apply them promptly once available. 7. Implement strict access controls and authentication mechanisms around management and debugging interfaces in the future to prevent similar issues. 8. Prepare incident response plans to quickly isolate and remediate compromised systems if exploitation is detected.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.546Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 685a0560dec26fc862d8cf6c
Added to database: 6/24/2025, 1:54:40 AM
Last enriched: 11/17/2025, 10:06:56 PM
Last updated: 11/21/2025, 5:10:49 AM
Views: 138
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64310: Improper restriction of excessive authentication attempts in SEIKO EPSON CORPORATION EPSON WebConfig for SEIKO EPSON Projector Products
CriticalCVE-2025-64762: CWE-524: Use of Cache Containing Sensitive Information in workos authkit-nextjs
HighCVE-2025-64755: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-62426: CWE-770: Allocation of Resources Without Limits or Throttling in vllm-project vllm
MediumCVE-2025-62372: CWE-129: Improper Validation of Array Index in vllm-project vllm
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.