Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-51746: n/a

0
Critical
VulnerabilityCVE-2025-51746cvecve-2025-51746
Published: Tue Nov 25 2025 (11/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in jishenghua JSH_ERP 2.3.1. The /serialNumber/addSerialNumber endpoint is vulnerable to fastjson deserialization attacks.

AI-Powered Analysis

AILast updated: 12/02/2025, 21:41:08 UTC

Technical Analysis

CVE-2025-51746 is a critical vulnerability found in the jishenghua JSH_ERP version 2.3.1, specifically affecting the /serialNumber/addSerialNumber endpoint. The issue arises from unsafe deserialization of data using the fastjson library, a common Java JSON parser known to have had multiple deserialization vulnerabilities. Attackers can send crafted serialized objects to this endpoint, which the application deserializes without proper validation or filtering, leading to remote code execution (RCE). The vulnerability is exploitable remotely over the network without any authentication or user interaction, making it highly dangerous. The CVSS v3.1 score of 9.8 reflects its critical nature, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the presence of this vulnerability in an ERP system that likely manages critical business processes and sensitive data makes it a prime target for attackers. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations. This vulnerability falls under CWE-502 (Deserialization of Untrusted Data), a well-known category that has historically led to severe breaches in enterprise environments.

Potential Impact

For European organizations, the impact of CVE-2025-51746 could be devastating. ERP systems like JSH_ERP often handle sensitive business data, including inventory, serial numbers, procurement, and financial information. Successful exploitation could lead to full system compromise, allowing attackers to steal confidential data, alter records, disrupt business operations, or deploy ransomware. The availability of the ERP system could be severely affected, causing operational downtime and financial losses. Given the criticality of manufacturing and industrial sectors in Europe, especially in countries like Germany, France, Italy, and the UK, the disruption of ERP systems could have cascading effects on supply chains and production lines. Additionally, the breach of sensitive data could lead to regulatory penalties under GDPR and damage to corporate reputation. The ease of exploitation without authentication means that attackers can target these systems at scale, increasing the risk of widespread incidents.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the /serialNumber/addSerialNumber endpoint by implementing network-level controls such as IP whitelisting or VPN-only access. 2. Employ Web Application Firewalls (WAFs) with rules designed to detect and block malicious serialized payloads targeting fastjson deserialization vulnerabilities. 3. Monitor application logs and network traffic for unusual or unexpected serialized object patterns indicative of exploitation attempts. 4. If possible, disable or replace the fastjson library with a safer alternative or upgrade to a version that includes deserialization security fixes. 5. Implement strict input validation and deserialization filters to reject untrusted or malformed data before processing. 6. Engage with the vendor for patches or official guidance and apply updates as soon as they become available. 7. Conduct internal audits to identify all instances of fastjson usage within the ERP and related systems to ensure comprehensive coverage. 8. Educate development and security teams about deserialization risks and secure coding practices to prevent future vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69261d1814e694ef3cf57cc1

Added to database: 11/25/2025, 9:18:16 PM

Last enriched: 12/2/2025, 9:41:08 PM

Last updated: 1/10/2026, 10:10:33 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats