Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-51744: n/a

0
Critical
VulnerabilityCVE-2025-51744cvecve-2025-51744
Published: Tue Nov 25 2025 (11/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in jishenghua JSH_ERP 2.3.1. The /user/addUser endpoint is vulnerable to fastjson deserialization attacks.

AI-Powered Analysis

AILast updated: 12/02/2025, 21:42:19 UTC

Technical Analysis

CVE-2025-51744 is a critical security vulnerability identified in the jishenghua JSH_ERP version 2.3.1, specifically affecting the /user/addUser API endpoint. The flaw arises from unsafe deserialization of JSON data using the fastjson library, a common Java JSON parser known to have had multiple deserialization vulnerabilities in the past. Deserialization vulnerabilities occur when untrusted input is parsed into objects without proper validation, allowing attackers to craft malicious payloads that can trigger arbitrary code execution on the server. This vulnerability does not require any authentication (PR:N), user interaction (UI:N), and can be exploited remotely over the network (AV:N), making it highly accessible to attackers. The CVSS 3.1 vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects the highest severity, indicating complete compromise of confidentiality, integrity, and availability of the affected system. Although no public exploits have been reported yet, the nature of the vulnerability and the widespread use of fastjson in Java applications suggest a high likelihood of exploitation once proof-of-concept code becomes available. The vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), a well-known category that has historically led to severe breaches. No patches or fixes are currently linked, emphasizing the need for immediate defensive measures. Organizations using JSH_ERP 2.3.1 should consider this a critical threat and act accordingly.

Potential Impact

For European organizations, the impact of CVE-2025-51744 could be severe. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, potentially leading to full system compromise, data theft, disruption of business operations, and lateral movement within corporate networks. ERP systems typically handle sensitive business data, including financial records, employee information, and operational workflows, making them high-value targets. A breach could result in significant financial losses, regulatory penalties under GDPR for data breaches, and reputational damage. The availability impact could disrupt critical business processes, especially in manufacturing, logistics, and supply chain sectors reliant on ERP systems. Given the criticality and ease of exploitation, European organizations using JSH_ERP 2.3.1 face a high risk of targeted attacks or opportunistic exploitation by cybercriminals or state-sponsored actors. The lack of known exploits currently provides a window for proactive defense, but this may close rapidly.

Mitigation Recommendations

1. Immediately restrict access to the /user/addUser endpoint by implementing network-level controls such as IP whitelisting or VPN requirements to limit exposure. 2. Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious deserialization payloads targeting fastjson vulnerabilities. 3. If possible, disable or remove the vulnerable endpoint until a vendor patch is available. 4. Implement strict input validation and sanitization on all JSON inputs to prevent malicious object injection. 5. Monitor logs for unusual activity or malformed JSON requests indicative of exploitation attempts. 6. Segment the ERP system network to minimize lateral movement if compromise occurs. 7. Engage with the vendor for timely patches or updates and apply them as soon as they are released. 8. Conduct internal security assessments and penetration tests focusing on deserialization vulnerabilities. 9. Educate development and security teams about the risks of unsafe deserialization and secure coding practices. 10. Prepare incident response plans specific to ERP system compromises to reduce response time in case of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69261d1814e694ef3cf57cb5

Added to database: 11/25/2025, 9:18:16 PM

Last enriched: 12/2/2025, 9:42:19 PM

Last updated: 1/10/2026, 10:11:23 PM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats