Skip to main content

CVE-2025-55370: n/a

High
VulnerabilityCVE-2025-55370cvecve-2025-55370
Published: Thu Aug 21 2025 (08/21/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Incorrect access control in the component \controller\ResourceController.java of jshERP v3.5 allows unauthorized attackers to obtain all the corresponding ID data by modifying the ID value.

AI-Powered Analysis

AILast updated: 08/21/2025, 14:33:19 UTC

Technical Analysis

CVE-2025-55370 is a security vulnerability identified in the jshERP software, specifically within the ResourceController.java component. The flaw stems from incorrect access control mechanisms that allow unauthorized attackers to manipulate the ID parameter in requests. By modifying this ID value, attackers can bypass intended access restrictions and retrieve all associated ID data that should otherwise be protected. This indicates a broken access control vulnerability where the application fails to properly validate user permissions before disclosing sensitive resource identifiers. Since the vulnerability resides in a controller component, it likely affects the backend API or web interface responsible for resource management in jshERP version 3.5. The absence of a CVSS score and lack of known exploits in the wild suggest this is a newly discovered issue, but the nature of the vulnerability implies a significant risk of unauthorized data exposure. Attackers exploiting this flaw could enumerate or extract sensitive identifiers, potentially leading to further attacks such as privilege escalation, data leakage, or lateral movement within affected systems. The vulnerability does not require user interaction but depends on the attacker’s ability to send crafted requests with modified ID values. No patch or mitigation guidance is currently provided, emphasizing the need for immediate attention from organizations using jshERP.

Potential Impact

For European organizations using jshERP v3.5, this vulnerability poses a substantial risk to confidentiality and integrity of sensitive business data. Unauthorized access to ID data can expose critical information about resources, clients, or internal processes managed by the ERP system. This exposure could facilitate industrial espionage, data theft, or compliance violations under regulations such as GDPR, which mandates strict controls on personal and business data. The vulnerability could also undermine trust in the ERP system’s security, potentially disrupting business operations if exploited. Given that ERP systems often integrate with multiple business functions, a breach here could cascade into broader operational impacts, including financial loss and reputational damage. The lack of known exploits currently limits immediate widespread impact, but the vulnerability’s simplicity and direct access control failure make it a high-value target for attackers once exploit code becomes available.

Mitigation Recommendations

European organizations should immediately conduct a thorough security review of their jshERP installations, focusing on access control enforcement in the ResourceController.java component or equivalent resource management modules. Until an official patch is released, organizations should implement strict network-level controls to restrict access to the ERP system to trusted internal users only. Employing Web Application Firewalls (WAFs) with custom rules to detect and block anomalous ID parameter modifications can provide temporary protection. Additionally, conducting code audits to implement proper authorization checks before serving resource data is critical. Organizations should also monitor logs for unusual access patterns or repeated ID parameter tampering attempts. Engaging with the jshERP vendor or community to obtain patches or updates is essential. Finally, ensuring that sensitive data is encrypted at rest and in transit can reduce the impact of unauthorized access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-13T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a72a8bad5a09ad00117f4d

Added to database: 8/21/2025, 2:17:47 PM

Last enriched: 8/21/2025, 2:33:19 PM

Last updated: 8/23/2025, 12:35:18 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats