CVE-2025-51745: n/a
An issue was discovered in jishenghua JSH_ERP 2.3.1. The /role/addcan endpoint is vulnerable to fastjson deserialization attacks.
AI Analysis
Technical Summary
CVE-2025-51745 identifies a critical security vulnerability in the jishenghua JSH_ERP version 2.3.1, specifically targeting the /role/addcan endpoint. The vulnerability arises from unsafe deserialization of JSON data using the fastjson library, a common Java JSON parser known to have had multiple deserialization issues historically. In this context, an attacker can craft malicious JSON payloads that, when processed by the vulnerable endpoint, lead to arbitrary code execution or denial of service conditions. This occurs because fastjson deserialization can instantiate arbitrary classes if not properly configured or restricted, allowing attackers to exploit gadget chains. The vulnerability does not require prior authentication, increasing its risk profile, and no user interaction is needed beyond sending a crafted HTTP request. Although no public exploits have been reported yet, the nature of the flaw and the endpoint's role in managing user roles or permissions could allow attackers to escalate privileges or disrupt ERP operations. The lack of a CVSS score suggests this is a recently published vulnerability, with mitigation details and patches not yet widely available. The ERP system is likely deployed in enterprise environments managing critical business processes, making this vulnerability particularly dangerous if exploited.
Potential Impact
For European organizations, exploitation of CVE-2025-51745 could lead to severe consequences including unauthorized access to sensitive business data, manipulation or deletion of critical ERP records, and potential full system compromise. The ERP system's role in managing roles and permissions means attackers could escalate privileges, leading to broader network infiltration. Disruption of ERP services can halt business operations, causing financial losses and reputational damage. Additionally, compromised ERP systems may expose personal data subject to GDPR, leading to regulatory penalties. The absence of authentication requirements for exploitation increases the attack surface, especially for externally accessible ERP instances. The impact is magnified in sectors heavily reliant on ERP systems such as manufacturing, logistics, and public administration, which are prevalent across Europe. Organizations may also face challenges in incident response due to the complexity of ERP environments and potential lack of immediate patches.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the /role/addcan endpoint through network segmentation and firewall rules, limiting exposure to untrusted networks. Organizations should implement strict input validation and disable or restrict fastjson features that allow auto-type deserialization, such as setting 'autoTypeSupport' to false. Monitoring and logging of deserialization activities should be enhanced to detect anomalous payloads. If possible, upgrade to a patched version of JSH_ERP once available or apply vendor-provided workarounds. Employ web application firewalls (WAFs) with custom rules to block known malicious deserialization patterns targeting fastjson. Conduct thorough code reviews and penetration testing focused on deserialization vulnerabilities. Educate development and security teams about secure deserialization practices to prevent similar issues. Finally, maintain an incident response plan tailored to ERP compromises to minimize damage in case of exploitation.
Affected Countries
Germany, France, Italy, Spain, Poland, Netherlands, Belgium, Czech Republic, Sweden, Austria
CVE-2025-51745: n/a
Description
An issue was discovered in jishenghua JSH_ERP 2.3.1. The /role/addcan endpoint is vulnerable to fastjson deserialization attacks.
AI-Powered Analysis
Technical Analysis
CVE-2025-51745 identifies a critical security vulnerability in the jishenghua JSH_ERP version 2.3.1, specifically targeting the /role/addcan endpoint. The vulnerability arises from unsafe deserialization of JSON data using the fastjson library, a common Java JSON parser known to have had multiple deserialization issues historically. In this context, an attacker can craft malicious JSON payloads that, when processed by the vulnerable endpoint, lead to arbitrary code execution or denial of service conditions. This occurs because fastjson deserialization can instantiate arbitrary classes if not properly configured or restricted, allowing attackers to exploit gadget chains. The vulnerability does not require prior authentication, increasing its risk profile, and no user interaction is needed beyond sending a crafted HTTP request. Although no public exploits have been reported yet, the nature of the flaw and the endpoint's role in managing user roles or permissions could allow attackers to escalate privileges or disrupt ERP operations. The lack of a CVSS score suggests this is a recently published vulnerability, with mitigation details and patches not yet widely available. The ERP system is likely deployed in enterprise environments managing critical business processes, making this vulnerability particularly dangerous if exploited.
Potential Impact
For European organizations, exploitation of CVE-2025-51745 could lead to severe consequences including unauthorized access to sensitive business data, manipulation or deletion of critical ERP records, and potential full system compromise. The ERP system's role in managing roles and permissions means attackers could escalate privileges, leading to broader network infiltration. Disruption of ERP services can halt business operations, causing financial losses and reputational damage. Additionally, compromised ERP systems may expose personal data subject to GDPR, leading to regulatory penalties. The absence of authentication requirements for exploitation increases the attack surface, especially for externally accessible ERP instances. The impact is magnified in sectors heavily reliant on ERP systems such as manufacturing, logistics, and public administration, which are prevalent across Europe. Organizations may also face challenges in incident response due to the complexity of ERP environments and potential lack of immediate patches.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the /role/addcan endpoint through network segmentation and firewall rules, limiting exposure to untrusted networks. Organizations should implement strict input validation and disable or restrict fastjson features that allow auto-type deserialization, such as setting 'autoTypeSupport' to false. Monitoring and logging of deserialization activities should be enhanced to detect anomalous payloads. If possible, upgrade to a patched version of JSH_ERP once available or apply vendor-provided workarounds. Employ web application firewalls (WAFs) with custom rules to block known malicious deserialization patterns targeting fastjson. Conduct thorough code reviews and penetration testing focused on deserialization vulnerabilities. Educate development and security teams about secure deserialization practices to prevent similar issues. Finally, maintain an incident response plan tailored to ERP compromises to minimize damage in case of exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69261d1814e694ef3cf57cbb
Added to database: 11/25/2025, 9:18:16 PM
Last enriched: 11/25/2025, 9:18:49 PM
Last updated: 11/25/2025, 10:53:23 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13597: CWE-434 Unrestricted Upload of File with Dangerous Type in soportecibeles AI Feeds
CriticalCVE-2025-13595: CWE-434 Unrestricted Upload of File with Dangerous Type in soportecibeles CIBELES AI
CriticalCVE-2025-64713: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in bytecodealliance wasm-micro-runtime
MediumCVE-2025-64704: CWE-754: Improper Check for Unusual or Exceptional Conditions in bytecodealliance wasm-micro-runtime
MediumCVE-2025-63735: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.