CVE-2025-51744: n/a
An issue was discovered in jishenghua JSH_ERP 2.3.1. The /user/addUser endpoint is vulnerable to fastjson deserialization attacks.
AI Analysis
Technical Summary
CVE-2025-51744 is a critical security vulnerability identified in the jishenghua JSH_ERP version 2.3.1, specifically affecting the /user/addUser API endpoint. The flaw arises from unsafe deserialization of JSON data using the fastjson library, a common Java JSON parser known to have had multiple deserialization vulnerabilities in the past. Deserialization vulnerabilities occur when untrusted input is parsed into objects without proper validation, allowing attackers to craft malicious payloads that can trigger arbitrary code execution on the server. This vulnerability does not require any authentication (PR:N), user interaction (UI:N), and can be exploited remotely over the network (AV:N), making it highly accessible to attackers. The CVSS 3.1 vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects the highest severity, indicating complete compromise of confidentiality, integrity, and availability of the affected system. Although no public exploits have been reported yet, the nature of the vulnerability and the widespread use of fastjson in Java applications suggest a high likelihood of exploitation once proof-of-concept code becomes available. The vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), a well-known category that has historically led to severe breaches. No patches or fixes are currently linked, emphasizing the need for immediate defensive measures. Organizations using JSH_ERP 2.3.1 should consider this a critical threat and act accordingly.
Potential Impact
For European organizations, the impact of CVE-2025-51744 could be severe. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, potentially leading to full system compromise, data theft, disruption of business operations, and lateral movement within corporate networks. ERP systems typically handle sensitive business data, including financial records, employee information, and operational workflows, making them high-value targets. A breach could result in significant financial losses, regulatory penalties under GDPR for data breaches, and reputational damage. The availability impact could disrupt critical business processes, especially in manufacturing, logistics, and supply chain sectors reliant on ERP systems. Given the criticality and ease of exploitation, European organizations using JSH_ERP 2.3.1 face a high risk of targeted attacks or opportunistic exploitation by cybercriminals or state-sponsored actors. The lack of known exploits currently provides a window for proactive defense, but this may close rapidly.
Mitigation Recommendations
1. Immediately restrict access to the /user/addUser endpoint by implementing network-level controls such as IP whitelisting or VPN requirements to limit exposure. 2. Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious deserialization payloads targeting fastjson vulnerabilities. 3. If possible, disable or remove the vulnerable endpoint until a vendor patch is available. 4. Implement strict input validation and sanitization on all JSON inputs to prevent malicious object injection. 5. Monitor logs for unusual activity or malformed JSON requests indicative of exploitation attempts. 6. Segment the ERP system network to minimize lateral movement if compromise occurs. 7. Engage with the vendor for timely patches or updates and apply them as soon as they are released. 8. Conduct internal security assessments and penetration tests focusing on deserialization vulnerabilities. 9. Educate development and security teams about the risks of unsafe deserialization and secure coding practices. 10. Prepare incident response plans specific to ERP system compromises to reduce response time in case of exploitation.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland, Belgium
CVE-2025-51744: n/a
Description
An issue was discovered in jishenghua JSH_ERP 2.3.1. The /user/addUser endpoint is vulnerable to fastjson deserialization attacks.
AI-Powered Analysis
Technical Analysis
CVE-2025-51744 is a critical security vulnerability identified in the jishenghua JSH_ERP version 2.3.1, specifically affecting the /user/addUser API endpoint. The flaw arises from unsafe deserialization of JSON data using the fastjson library, a common Java JSON parser known to have had multiple deserialization vulnerabilities in the past. Deserialization vulnerabilities occur when untrusted input is parsed into objects without proper validation, allowing attackers to craft malicious payloads that can trigger arbitrary code execution on the server. This vulnerability does not require any authentication (PR:N), user interaction (UI:N), and can be exploited remotely over the network (AV:N), making it highly accessible to attackers. The CVSS 3.1 vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects the highest severity, indicating complete compromise of confidentiality, integrity, and availability of the affected system. Although no public exploits have been reported yet, the nature of the vulnerability and the widespread use of fastjson in Java applications suggest a high likelihood of exploitation once proof-of-concept code becomes available. The vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), a well-known category that has historically led to severe breaches. No patches or fixes are currently linked, emphasizing the need for immediate defensive measures. Organizations using JSH_ERP 2.3.1 should consider this a critical threat and act accordingly.
Potential Impact
For European organizations, the impact of CVE-2025-51744 could be severe. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, potentially leading to full system compromise, data theft, disruption of business operations, and lateral movement within corporate networks. ERP systems typically handle sensitive business data, including financial records, employee information, and operational workflows, making them high-value targets. A breach could result in significant financial losses, regulatory penalties under GDPR for data breaches, and reputational damage. The availability impact could disrupt critical business processes, especially in manufacturing, logistics, and supply chain sectors reliant on ERP systems. Given the criticality and ease of exploitation, European organizations using JSH_ERP 2.3.1 face a high risk of targeted attacks or opportunistic exploitation by cybercriminals or state-sponsored actors. The lack of known exploits currently provides a window for proactive defense, but this may close rapidly.
Mitigation Recommendations
1. Immediately restrict access to the /user/addUser endpoint by implementing network-level controls such as IP whitelisting or VPN requirements to limit exposure. 2. Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious deserialization payloads targeting fastjson vulnerabilities. 3. If possible, disable or remove the vulnerable endpoint until a vendor patch is available. 4. Implement strict input validation and sanitization on all JSON inputs to prevent malicious object injection. 5. Monitor logs for unusual activity or malformed JSON requests indicative of exploitation attempts. 6. Segment the ERP system network to minimize lateral movement if compromise occurs. 7. Engage with the vendor for timely patches or updates and apply them as soon as they are released. 8. Conduct internal security assessments and penetration tests focusing on deserialization vulnerabilities. 9. Educate development and security teams about the risks of unsafe deserialization and secure coding practices. 10. Prepare incident response plans specific to ERP system compromises to reduce response time in case of exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69261d1814e694ef3cf57cb5
Added to database: 11/25/2025, 9:18:16 PM
Last enriched: 12/2/2025, 9:42:19 PM
Last updated: 1/10/2026, 10:11:23 PM
Views: 86
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.