CVE-2025-51746: n/a
An issue was discovered in jishenghua JSH_ERP 2.3.1. The /serialNumber/addSerialNumber endpoint is vulnerable to fastjson deserialization attacks.
AI Analysis
Technical Summary
CVE-2025-51746 is a critical vulnerability found in the jishenghua JSH_ERP version 2.3.1, specifically affecting the /serialNumber/addSerialNumber endpoint. The issue arises from unsafe deserialization of data using the fastjson library, a common Java JSON parser known to have had multiple deserialization vulnerabilities. Attackers can send crafted serialized objects to this endpoint, which the application deserializes without proper validation or filtering, leading to remote code execution (RCE). The vulnerability is exploitable remotely over the network without any authentication or user interaction, making it highly dangerous. The CVSS v3.1 score of 9.8 reflects its critical nature, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the presence of this vulnerability in an ERP system that likely manages critical business processes and sensitive data makes it a prime target for attackers. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations. This vulnerability falls under CWE-502 (Deserialization of Untrusted Data), a well-known category that has historically led to severe breaches in enterprise environments.
Potential Impact
For European organizations, the impact of CVE-2025-51746 could be devastating. ERP systems like JSH_ERP often handle sensitive business data, including inventory, serial numbers, procurement, and financial information. Successful exploitation could lead to full system compromise, allowing attackers to steal confidential data, alter records, disrupt business operations, or deploy ransomware. The availability of the ERP system could be severely affected, causing operational downtime and financial losses. Given the criticality of manufacturing and industrial sectors in Europe, especially in countries like Germany, France, Italy, and the UK, the disruption of ERP systems could have cascading effects on supply chains and production lines. Additionally, the breach of sensitive data could lead to regulatory penalties under GDPR and damage to corporate reputation. The ease of exploitation without authentication means that attackers can target these systems at scale, increasing the risk of widespread incidents.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting access to the /serialNumber/addSerialNumber endpoint by implementing network-level controls such as IP whitelisting or VPN-only access. 2. Employ Web Application Firewalls (WAFs) with rules designed to detect and block malicious serialized payloads targeting fastjson deserialization vulnerabilities. 3. Monitor application logs and network traffic for unusual or unexpected serialized object patterns indicative of exploitation attempts. 4. If possible, disable or replace the fastjson library with a safer alternative or upgrade to a version that includes deserialization security fixes. 5. Implement strict input validation and deserialization filters to reject untrusted or malformed data before processing. 6. Engage with the vendor for patches or official guidance and apply updates as soon as they become available. 7. Conduct internal audits to identify all instances of fastjson usage within the ERP and related systems to ensure comprehensive coverage. 8. Educate development and security teams about deserialization risks and secure coding practices to prevent future vulnerabilities.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium
CVE-2025-51746: n/a
Description
An issue was discovered in jishenghua JSH_ERP 2.3.1. The /serialNumber/addSerialNumber endpoint is vulnerable to fastjson deserialization attacks.
AI-Powered Analysis
Technical Analysis
CVE-2025-51746 is a critical vulnerability found in the jishenghua JSH_ERP version 2.3.1, specifically affecting the /serialNumber/addSerialNumber endpoint. The issue arises from unsafe deserialization of data using the fastjson library, a common Java JSON parser known to have had multiple deserialization vulnerabilities. Attackers can send crafted serialized objects to this endpoint, which the application deserializes without proper validation or filtering, leading to remote code execution (RCE). The vulnerability is exploitable remotely over the network without any authentication or user interaction, making it highly dangerous. The CVSS v3.1 score of 9.8 reflects its critical nature, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the presence of this vulnerability in an ERP system that likely manages critical business processes and sensitive data makes it a prime target for attackers. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations. This vulnerability falls under CWE-502 (Deserialization of Untrusted Data), a well-known category that has historically led to severe breaches in enterprise environments.
Potential Impact
For European organizations, the impact of CVE-2025-51746 could be devastating. ERP systems like JSH_ERP often handle sensitive business data, including inventory, serial numbers, procurement, and financial information. Successful exploitation could lead to full system compromise, allowing attackers to steal confidential data, alter records, disrupt business operations, or deploy ransomware. The availability of the ERP system could be severely affected, causing operational downtime and financial losses. Given the criticality of manufacturing and industrial sectors in Europe, especially in countries like Germany, France, Italy, and the UK, the disruption of ERP systems could have cascading effects on supply chains and production lines. Additionally, the breach of sensitive data could lead to regulatory penalties under GDPR and damage to corporate reputation. The ease of exploitation without authentication means that attackers can target these systems at scale, increasing the risk of widespread incidents.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting access to the /serialNumber/addSerialNumber endpoint by implementing network-level controls such as IP whitelisting or VPN-only access. 2. Employ Web Application Firewalls (WAFs) with rules designed to detect and block malicious serialized payloads targeting fastjson deserialization vulnerabilities. 3. Monitor application logs and network traffic for unusual or unexpected serialized object patterns indicative of exploitation attempts. 4. If possible, disable or replace the fastjson library with a safer alternative or upgrade to a version that includes deserialization security fixes. 5. Implement strict input validation and deserialization filters to reject untrusted or malformed data before processing. 6. Engage with the vendor for patches or official guidance and apply updates as soon as they become available. 7. Conduct internal audits to identify all instances of fastjson usage within the ERP and related systems to ensure comprehensive coverage. 8. Educate development and security teams about deserialization risks and secure coding practices to prevent future vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69261d1814e694ef3cf57cc1
Added to database: 11/25/2025, 9:18:16 PM
Last enriched: 12/2/2025, 9:41:08 PM
Last updated: 1/10/2026, 10:10:33 PM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.