Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-51743: n/a

0
High
VulnerabilityCVE-2025-51743cvecve-2025-51743
Published: Tue Nov 25 2025 (11/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-51743 is a deserialization vulnerability in the jishenghua JSH_ERP 2. 3. 1 software, specifically in the /materialCategory/addMaterialCategory endpoint which uses fastjson for JSON processing. This flaw allows an attacker to craft malicious JSON input that, when deserialized by the vulnerable endpoint, could lead to remote code execution or other malicious actions. No CVSS score is assigned yet, and no known exploits are reported in the wild. The vulnerability affects ERP systems that manage material categories, potentially impacting business operations and data integrity. European organizations using this ERP software should be aware of the risk and prioritize mitigation. Due to the lack of a patch and public exploit, the threat is currently theoretical but could become critical if weaponized. Mitigation involves restricting or disabling fastjson deserialization, applying input validation, and monitoring for suspicious activity. Countries with significant manufacturing and industrial sectors using JSH_ERP or similar ERP solutions are at higher risk.

AI-Powered Analysis

AILast updated: 11/25/2025, 21:19:21 UTC

Technical Analysis

CVE-2025-51743 identifies a security vulnerability in the jishenghua JSH_ERP version 2.3.1, specifically in the /materialCategory/addMaterialCategory API endpoint. This endpoint utilizes the fastjson library for JSON deserialization, which is known to be vulnerable to unsafe deserialization attacks if not properly configured. An attacker can exploit this vulnerability by sending specially crafted JSON payloads that, when deserialized by fastjson, can trigger execution of arbitrary code or other malicious behaviors on the server. This type of vulnerability arises because fastjson can instantiate arbitrary classes during deserialization if the feature allowing auto-type support is enabled or improperly restricted. The vulnerability does not require prior authentication, increasing its risk profile. Although no CVSS score is assigned and no public exploits have been reported, the potential impact includes full compromise of the ERP system, data theft, data manipulation, or disruption of business processes. The vulnerability affects organizations using JSH_ERP 2.3.1, which is an enterprise resource planning system likely used in manufacturing and supply chain management. The lack of available patches or mitigations from the vendor increases the urgency for organizations to implement defensive controls. This vulnerability highlights the risks of unsafe deserialization in web applications and the need for secure JSON processing configurations.

Potential Impact

For European organizations, exploitation of CVE-2025-51743 could lead to severe consequences including unauthorized remote code execution on critical ERP infrastructure. This can result in theft or manipulation of sensitive business data, disruption of supply chain and manufacturing operations, and potential lateral movement within corporate networks. Given that ERP systems often integrate with financial, inventory, and production modules, a successful attack could compromise operational continuity and lead to significant financial losses. Additionally, data breaches involving personal or proprietary information could trigger regulatory penalties under GDPR. The lack of authentication requirement and the exposure of the vulnerable endpoint over the network increase the attack surface. Organizations in sectors such as manufacturing, logistics, and industrial production, which heavily rely on ERP systems like JSH_ERP, are particularly vulnerable. The absence of known exploits currently provides a window for proactive mitigation, but the threat could escalate rapidly if weaponized by attackers.

Mitigation Recommendations

European organizations should immediately audit their use of JSH_ERP 2.3.1 and identify if the vulnerable /materialCategory/addMaterialCategory endpoint is exposed. Specific mitigations include: 1) Disable or restrict fastjson's auto-type feature to prevent unsafe deserialization; 2) Implement strict input validation and JSON schema validation on all incoming data to the endpoint; 3) Employ web application firewalls (WAF) with custom rules to detect and block malicious deserialization payloads; 4) Monitor logs and network traffic for anomalous requests targeting the vulnerable endpoint; 5) Isolate the ERP system within segmented network zones to limit lateral movement; 6) Engage with the vendor for patches or updates and apply them promptly once available; 7) Consider deploying runtime application self-protection (RASP) solutions to detect exploitation attempts; 8) Educate development and security teams about secure deserialization practices to prevent similar vulnerabilities in future releases. These targeted actions go beyond generic advice and address the specific nature of the fastjson deserialization risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69261d1814e694ef3cf57caf

Added to database: 11/25/2025, 9:18:16 PM

Last enriched: 11/25/2025, 9:19:21 PM

Last updated: 11/25/2025, 9:19:29 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats