CVE-2025-55367: n/a
Incorrect access control in the component \controller\SupplierController.java of jshERP v3.5 allows unauthorized attackers to arbitrarily modify the supplier status under any account.
AI Analysis
Technical Summary
CVE-2025-55367 is a vulnerability identified in the jshERP software, specifically within the SupplierController.java component. The flaw is an incorrect access control issue that allows unauthorized attackers to modify the supplier status arbitrarily under any user account. This means that an attacker does not need proper authentication or authorization to change critical supplier information, potentially leading to unauthorized data manipulation or disruption of supplier-related business processes. The vulnerability arises from insufficient validation or enforcement of access control policies in the controller handling supplier status updates. Since the affected version is unspecified, it is unclear which exact releases of jshERP are impacted, but the vulnerability is present in version 3.5 as per the description. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. The vulnerability was reserved on August 13, 2025, and published on August 21, 2025. The lack of patch links suggests that a fix may not yet be publicly available or disclosed. Given that jshERP is an enterprise resource planning system, the ability to alter supplier status without authorization could lead to significant business process disruptions, data integrity issues, and potential financial or reputational damage.
Potential Impact
For European organizations using jshERP, this vulnerability poses a significant risk to supply chain management and procurement operations. Unauthorized modification of supplier status could result in incorrect supplier data, potentially causing erroneous order processing, payment issues, or disruption of supply chains. This could affect operational continuity, financial accuracy, and compliance with regulatory requirements such as GDPR if supplier data integrity is compromised. Additionally, attackers could leverage this vulnerability to introduce fraudulent suppliers or disable legitimate ones, impacting trust and contractual relationships. The impact is particularly critical for industries heavily reliant on supplier data accuracy, such as manufacturing, retail, and logistics sectors prevalent across Europe. The absence of authentication requirements for exploitation increases the risk of automated or opportunistic attacks, potentially affecting multiple organizations if the vulnerability is widespread in the jshERP user base.
Mitigation Recommendations
Organizations should immediately audit their jshERP installations to determine if they are running version 3.5 or other potentially affected versions. Until an official patch is released, it is advisable to implement compensating controls such as restricting network access to the SupplierController endpoint through firewalls or web application firewalls (WAFs), enforcing strict IP whitelisting, and monitoring logs for unusual supplier status modification attempts. Role-based access controls (RBAC) should be reviewed and tightened at the application and database levels to prevent unauthorized changes. Additionally, organizations should consider temporarily disabling supplier status modification features if feasible. Regular integrity checks and alerts on supplier data changes can help detect exploitation attempts early. Engaging with the jshERP vendor for timely patch releases and updates is critical. Finally, educating staff about the risk and ensuring incident response plans include scenarios involving ERP system compromise will improve preparedness.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-55367: n/a
Description
Incorrect access control in the component \controller\SupplierController.java of jshERP v3.5 allows unauthorized attackers to arbitrarily modify the supplier status under any account.
AI-Powered Analysis
Technical Analysis
CVE-2025-55367 is a vulnerability identified in the jshERP software, specifically within the SupplierController.java component. The flaw is an incorrect access control issue that allows unauthorized attackers to modify the supplier status arbitrarily under any user account. This means that an attacker does not need proper authentication or authorization to change critical supplier information, potentially leading to unauthorized data manipulation or disruption of supplier-related business processes. The vulnerability arises from insufficient validation or enforcement of access control policies in the controller handling supplier status updates. Since the affected version is unspecified, it is unclear which exact releases of jshERP are impacted, but the vulnerability is present in version 3.5 as per the description. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. The vulnerability was reserved on August 13, 2025, and published on August 21, 2025. The lack of patch links suggests that a fix may not yet be publicly available or disclosed. Given that jshERP is an enterprise resource planning system, the ability to alter supplier status without authorization could lead to significant business process disruptions, data integrity issues, and potential financial or reputational damage.
Potential Impact
For European organizations using jshERP, this vulnerability poses a significant risk to supply chain management and procurement operations. Unauthorized modification of supplier status could result in incorrect supplier data, potentially causing erroneous order processing, payment issues, or disruption of supply chains. This could affect operational continuity, financial accuracy, and compliance with regulatory requirements such as GDPR if supplier data integrity is compromised. Additionally, attackers could leverage this vulnerability to introduce fraudulent suppliers or disable legitimate ones, impacting trust and contractual relationships. The impact is particularly critical for industries heavily reliant on supplier data accuracy, such as manufacturing, retail, and logistics sectors prevalent across Europe. The absence of authentication requirements for exploitation increases the risk of automated or opportunistic attacks, potentially affecting multiple organizations if the vulnerability is widespread in the jshERP user base.
Mitigation Recommendations
Organizations should immediately audit their jshERP installations to determine if they are running version 3.5 or other potentially affected versions. Until an official patch is released, it is advisable to implement compensating controls such as restricting network access to the SupplierController endpoint through firewalls or web application firewalls (WAFs), enforcing strict IP whitelisting, and monitoring logs for unusual supplier status modification attempts. Role-based access controls (RBAC) should be reviewed and tightened at the application and database levels to prevent unauthorized changes. Additionally, organizations should consider temporarily disabling supplier status modification features if feasible. Regular integrity checks and alerts on supplier data changes can help detect exploitation attempts early. Engaging with the jshERP vendor for timely patch releases and updates is critical. Finally, educating staff about the risk and ensuring incident response plans include scenarios involving ERP system compromise will improve preparedness.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-13T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68a72384ad5a09ad00111843
Added to database: 8/21/2025, 1:47:48 PM
Last enriched: 8/21/2025, 2:03:47 PM
Last updated: 8/22/2025, 7:00:38 AM
Views: 8
Related Threats
CVE-2025-57896: CWE-862 Missing Authorization in andy_moyle Church Admin
MediumCVE-2025-57895: CWE-352 Cross-Site Request Forgery (CSRF) in Hossni Mubarak JobWP
MediumCVE-2025-57894: CWE-862 Missing Authorization in ollybach WPPizza
MediumCVE-2025-57893: CWE-352 Cross-Site Request Forgery (CSRF) in Epsiloncool WP Fast Total Search
MediumCVE-2025-57892: CWE-352 Cross-Site Request Forgery (CSRF) in Jeff Starr Simple Statistics for Feeds
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.