Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-51742: n/a

0
Unknown
VulnerabilityCVE-2025-51742cvecve-2025-51742
Published: Tue Nov 25 2025 (11/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in jishenghua JSH_ERP 2.3.1. The /material/getMaterialEnableSerialNumberList endpoint passes the search query parameter directly to parseObject(), introducing a Fastjson deserialization vulnerability that can lead to RCE via JDBC payloads.

AI-Powered Analysis

AILast updated: 11/25/2025, 20:20:18 UTC

Technical Analysis

CVE-2025-51742 is a critical deserialization vulnerability identified in the jishenghua JSH_ERP software, specifically version 2.3.1. The vulnerability exists in the /material/getMaterialEnableSerialNumberList API endpoint, which accepts a search query parameter that is directly passed to Fastjson's parseObject() method. Fastjson is a widely used Java library for JSON parsing and serialization. Improper handling of untrusted input in parseObject() can lead to deserialization of malicious payloads. In this case, attackers can craft specially designed JSON payloads that exploit Fastjson's deserialization mechanism to execute arbitrary Java code remotely. The vulnerability leverages JDBC payloads, which are known to enable remote code execution by invoking database-related classes and methods during deserialization. This flaw does not require authentication or user interaction, making it highly exploitable in exposed environments. No CVSS score has been assigned yet, and no public exploits have been reported, but the technical details indicate a severe risk. The vulnerability was reserved in June 2025 and published in November 2025, indicating recent discovery. The lack of available patches at the time of reporting heightens the urgency for mitigation through configuration changes and input validation. Organizations using JSH_ERP in critical infrastructure or manufacturing should prioritize risk assessment and containment.

Potential Impact

For European organizations, the impact of CVE-2025-51742 could be severe. JSH_ERP is an enterprise resource planning system likely used in manufacturing, supply chain management, and materials tracking—sectors vital to European industrial economies. Successful exploitation could lead to full remote code execution on ERP servers, allowing attackers to manipulate business-critical data, disrupt operations, or move laterally within networks. Confidentiality of sensitive corporate data and intellectual property could be compromised, and integrity of inventory and production records could be undermined. Availability of ERP services might be affected by attacker-induced system crashes or ransomware deployment. Given the ERP’s role in operational continuity, such disruptions could cause significant financial losses and reputational damage. The lack of authentication requirement and ease of exploitation increase the risk of widespread attacks if the software is internet-facing or insufficiently segmented. European organizations with digital supply chains and manufacturing plants are particularly vulnerable to operational and economic impacts.

Mitigation Recommendations

To mitigate CVE-2025-51742, organizations should immediately implement strict input validation on all parameters accepted by the /material/getMaterialEnableSerialNumberList endpoint to prevent malicious JSON payloads from reaching Fastjson's parseObject(). Disabling or restricting Fastjson features that allow arbitrary type deserialization is critical; this can be done by configuring Fastjson's ParserConfig to whitelist only safe classes or by upgrading to a Fastjson version that enforces safer defaults. Network segmentation should be enforced to limit exposure of the ERP system to untrusted networks, and web application firewalls (WAFs) can be configured to detect and block suspicious JSON payloads. Monitoring and logging of API requests should be enhanced to detect anomalous deserialization attempts. Organizations should engage with the vendor for patches or updates addressing this vulnerability and apply them promptly once available. Additionally, conducting penetration testing focused on deserialization vulnerabilities can help identify residual risks. Backup and incident response plans should be reviewed and tested to prepare for potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69260c0cffc41f183f7e2ce6

Added to database: 11/25/2025, 8:05:32 PM

Last enriched: 11/25/2025, 8:20:18 PM

Last updated: 11/25/2025, 9:14:19 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats