Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-51745: n/a

0
Unknown
VulnerabilityCVE-2025-51745cvecve-2025-51745
Published: Tue Nov 25 2025 (11/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in jishenghua JSH_ERP 2.3.1. The /role/addcan endpoint is vulnerable to fastjson deserialization attacks.

AI-Powered Analysis

AILast updated: 11/25/2025, 21:18:49 UTC

Technical Analysis

CVE-2025-51745 identifies a critical security vulnerability in the jishenghua JSH_ERP version 2.3.1, specifically targeting the /role/addcan endpoint. The vulnerability arises from unsafe deserialization of JSON data using the fastjson library, a common Java JSON parser known to have had multiple deserialization issues historically. In this context, an attacker can craft malicious JSON payloads that, when processed by the vulnerable endpoint, lead to arbitrary code execution or denial of service conditions. This occurs because fastjson deserialization can instantiate arbitrary classes if not properly configured or restricted, allowing attackers to exploit gadget chains. The vulnerability does not require prior authentication, increasing its risk profile, and no user interaction is needed beyond sending a crafted HTTP request. Although no public exploits have been reported yet, the nature of the flaw and the endpoint's role in managing user roles or permissions could allow attackers to escalate privileges or disrupt ERP operations. The lack of a CVSS score suggests this is a recently published vulnerability, with mitigation details and patches not yet widely available. The ERP system is likely deployed in enterprise environments managing critical business processes, making this vulnerability particularly dangerous if exploited.

Potential Impact

For European organizations, exploitation of CVE-2025-51745 could lead to severe consequences including unauthorized access to sensitive business data, manipulation or deletion of critical ERP records, and potential full system compromise. The ERP system's role in managing roles and permissions means attackers could escalate privileges, leading to broader network infiltration. Disruption of ERP services can halt business operations, causing financial losses and reputational damage. Additionally, compromised ERP systems may expose personal data subject to GDPR, leading to regulatory penalties. The absence of authentication requirements for exploitation increases the attack surface, especially for externally accessible ERP instances. The impact is magnified in sectors heavily reliant on ERP systems such as manufacturing, logistics, and public administration, which are prevalent across Europe. Organizations may also face challenges in incident response due to the complexity of ERP environments and potential lack of immediate patches.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the /role/addcan endpoint through network segmentation and firewall rules, limiting exposure to untrusted networks. Organizations should implement strict input validation and disable or restrict fastjson features that allow auto-type deserialization, such as setting 'autoTypeSupport' to false. Monitoring and logging of deserialization activities should be enhanced to detect anomalous payloads. If possible, upgrade to a patched version of JSH_ERP once available or apply vendor-provided workarounds. Employ web application firewalls (WAFs) with custom rules to block known malicious deserialization patterns targeting fastjson. Conduct thorough code reviews and penetration testing focused on deserialization vulnerabilities. Educate development and security teams about secure deserialization practices to prevent similar issues. Finally, maintain an incident response plan tailored to ERP compromises to minimize damage in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69261d1814e694ef3cf57cbb

Added to database: 11/25/2025, 9:18:16 PM

Last enriched: 11/25/2025, 9:18:49 PM

Last updated: 11/25/2025, 10:53:23 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats