CVE-2025-51742: n/a
An issue was discovered in jishenghua JSH_ERP 2.3.1. The /material/getMaterialEnableSerialNumberList endpoint passes the search query parameter directly to parseObject(), introducing a Fastjson deserialization vulnerability that can lead to RCE via JDBC payloads.
AI Analysis
Technical Summary
CVE-2025-51742 is a critical remote code execution vulnerability identified in jishenghua JSH_ERP version 2.3.1, specifically in the /material/getMaterialEnableSerialNumberList API endpoint. The issue arises because the endpoint directly passes user-supplied search query parameters to Fastjson's parseObject() method without proper validation or sanitization. Fastjson is a popular Java library for JSON parsing and serialization, but it is known to be vulnerable to unsafe deserialization attacks if untrusted input is parsed. In this case, the vulnerability allows attackers to craft malicious JSON payloads that exploit Fastjson's deserialization mechanism to execute arbitrary code on the server. The attack vector involves JDBC payloads, which can be used to execute SQL commands or system-level commands, leading to full system compromise. The vulnerability requires no authentication (AV:N), has low attack complexity (AC:L), and does not require user interaction (UI:N), making it highly exploitable. The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), as attackers can execute arbitrary code, manipulate data, or disrupt services. Although no public exploits are reported yet, the critical CVSS score of 9.8 reflects the severity and urgency of addressing this flaw. The vulnerability is categorized under CWE-502 (Deserialization of Untrusted Data), a common and dangerous class of software flaws. No patches are currently listed, so organizations must implement mitigations promptly.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially those using jishenghua JSH_ERP or similar ERP solutions that incorporate Fastjson for JSON parsing. Successful exploitation can lead to complete system takeover, data breaches involving sensitive business and customer information, disruption of critical business operations, and potential lateral movement within corporate networks. The ability to execute arbitrary code remotely without authentication means attackers can deploy ransomware, steal intellectual property, or sabotage supply chains. Given the ERP system's role in managing materials and serial numbers, attackers could manipulate inventory data, causing financial losses and operational chaos. The lack of known exploits currently provides a window for proactive defense, but the high severity demands immediate attention. European companies in manufacturing, logistics, and supply chain sectors using Chinese or third-party ERP products are particularly at risk. Additionally, regulatory compliance frameworks such as GDPR impose strict data protection requirements, and breaches stemming from this vulnerability could result in significant fines and reputational damage.
Mitigation Recommendations
1. Immediate input validation and sanitization: Implement strict validation on the /material/getMaterialEnableSerialNumberList endpoint to reject or sanitize any suspicious or unexpected input before it reaches Fastjson's parseObject(). 2. Disable or replace Fastjson deserialization: Where possible, disable the use of Fastjson for deserializing untrusted input or replace it with safer JSON parsing libraries that do not support polymorphic deserialization. 3. Apply runtime protections: Use application-layer firewalls or runtime application self-protection (RASP) tools to detect and block malicious deserialization payloads targeting this endpoint. 4. Network segmentation and least privilege: Restrict network access to the ERP system and ensure that the application runs with minimal privileges to limit the impact of potential exploitation. 5. Monitor logs and alerts: Set up monitoring for unusual activity, such as unexpected JDBC calls or anomalous API requests to the vulnerable endpoint. 6. Vendor engagement: Engage with jishenghua or ERP vendors for patches or official mitigations and apply updates as soon as they become available. 7. Incident response readiness: Prepare incident response plans specific to deserialization attacks and RCE scenarios to enable rapid containment and recovery.
Affected Countries
Germany, France, Italy, Spain, Netherlands, Poland, Belgium, Czech Republic, Sweden, Austria
CVE-2025-51742: n/a
Description
An issue was discovered in jishenghua JSH_ERP 2.3.1. The /material/getMaterialEnableSerialNumberList endpoint passes the search query parameter directly to parseObject(), introducing a Fastjson deserialization vulnerability that can lead to RCE via JDBC payloads.
AI-Powered Analysis
Technical Analysis
CVE-2025-51742 is a critical remote code execution vulnerability identified in jishenghua JSH_ERP version 2.3.1, specifically in the /material/getMaterialEnableSerialNumberList API endpoint. The issue arises because the endpoint directly passes user-supplied search query parameters to Fastjson's parseObject() method without proper validation or sanitization. Fastjson is a popular Java library for JSON parsing and serialization, but it is known to be vulnerable to unsafe deserialization attacks if untrusted input is parsed. In this case, the vulnerability allows attackers to craft malicious JSON payloads that exploit Fastjson's deserialization mechanism to execute arbitrary code on the server. The attack vector involves JDBC payloads, which can be used to execute SQL commands or system-level commands, leading to full system compromise. The vulnerability requires no authentication (AV:N), has low attack complexity (AC:L), and does not require user interaction (UI:N), making it highly exploitable. The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), as attackers can execute arbitrary code, manipulate data, or disrupt services. Although no public exploits are reported yet, the critical CVSS score of 9.8 reflects the severity and urgency of addressing this flaw. The vulnerability is categorized under CWE-502 (Deserialization of Untrusted Data), a common and dangerous class of software flaws. No patches are currently listed, so organizations must implement mitigations promptly.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially those using jishenghua JSH_ERP or similar ERP solutions that incorporate Fastjson for JSON parsing. Successful exploitation can lead to complete system takeover, data breaches involving sensitive business and customer information, disruption of critical business operations, and potential lateral movement within corporate networks. The ability to execute arbitrary code remotely without authentication means attackers can deploy ransomware, steal intellectual property, or sabotage supply chains. Given the ERP system's role in managing materials and serial numbers, attackers could manipulate inventory data, causing financial losses and operational chaos. The lack of known exploits currently provides a window for proactive defense, but the high severity demands immediate attention. European companies in manufacturing, logistics, and supply chain sectors using Chinese or third-party ERP products are particularly at risk. Additionally, regulatory compliance frameworks such as GDPR impose strict data protection requirements, and breaches stemming from this vulnerability could result in significant fines and reputational damage.
Mitigation Recommendations
1. Immediate input validation and sanitization: Implement strict validation on the /material/getMaterialEnableSerialNumberList endpoint to reject or sanitize any suspicious or unexpected input before it reaches Fastjson's parseObject(). 2. Disable or replace Fastjson deserialization: Where possible, disable the use of Fastjson for deserializing untrusted input or replace it with safer JSON parsing libraries that do not support polymorphic deserialization. 3. Apply runtime protections: Use application-layer firewalls or runtime application self-protection (RASP) tools to detect and block malicious deserialization payloads targeting this endpoint. 4. Network segmentation and least privilege: Restrict network access to the ERP system and ensure that the application runs with minimal privileges to limit the impact of potential exploitation. 5. Monitor logs and alerts: Set up monitoring for unusual activity, such as unexpected JDBC calls or anomalous API requests to the vulnerable endpoint. 6. Vendor engagement: Engage with jishenghua or ERP vendors for patches or official mitigations and apply updates as soon as they become available. 7. Incident response readiness: Prepare incident response plans specific to deserialization attacks and RCE scenarios to enable rapid containment and recovery.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69260c0cffc41f183f7e2ce6
Added to database: 11/25/2025, 8:05:32 PM
Last enriched: 12/2/2025, 8:46:01 PM
Last updated: 1/10/2026, 10:12:31 PM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.