CVE-2025-5679: Deserialization in Shenzhen Dashi Tongzhou Information Technology AgileBPM
A vulnerability classified as critical has been found in Shenzhen Dashi Tongzhou Information Technology AgileBPM up to 2.5.0. Affected is the function parseStrByFreeMarker of the file /src/main/java/com/dstz/sys/rest/controller/SysToolsController.java. The manipulation of the argument str leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5679 is a medium-severity deserialization vulnerability affecting Shenzhen Dashi Tongzhou Information Technology's AgileBPM product versions 2.0 through 2.5.0. The vulnerability resides in the parseStrByFreeMarker function within the SysToolsController.java source file. Specifically, the flaw arises from unsafe handling of the 'str' argument, which is deserialized without proper validation or sanitization. This improper deserialization can be triggered remotely without authentication or user interaction, allowing an attacker to craft malicious input that the application will deserialize, potentially leading to arbitrary code execution or other malicious outcomes. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting a medium severity level, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is rated low individually but combined could lead to significant compromise depending on the payload. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. AgileBPM is a business process management platform used to automate and optimize enterprise workflows, making this vulnerability particularly concerning as it could allow attackers to disrupt critical business processes or gain unauthorized access to sensitive operational data.
Potential Impact
For European organizations using AgileBPM, this vulnerability poses a risk of unauthorized remote code execution or manipulation of business process workflows. Exploitation could lead to disruption of critical enterprise operations, data leakage, or unauthorized modification of process logic, impacting business continuity and compliance with data protection regulations such as GDPR. Given AgileBPM's role in managing workflows, an attacker could potentially interfere with financial processes, HR systems, or supply chain management, causing operational and reputational damage. The medium CVSS score suggests that while exploitation is feasible, the impact may be limited by the need for specific conditions or partial mitigations in place. However, the lack of authentication and user interaction requirements makes it easier for attackers to attempt exploitation at scale, increasing the threat surface for European enterprises relying on this software.
Mitigation Recommendations
Organizations should immediately identify and inventory all instances of AgileBPM versions 2.0 through 2.5.0 in their environment. Since no official patches are currently linked, it is critical to implement compensating controls such as network segmentation to restrict access to AgileBPM management interfaces, especially from untrusted networks. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious deserialization payloads targeting the parseStrByFreeMarker function. Monitor logs for anomalous input patterns or unexpected deserialization attempts. If possible, disable or restrict the vulnerable endpoint until a vendor patch is released. Engage with Shenzhen Dashi Tongzhou Information Technology for updates and apply patches promptly once available. Additionally, conduct code reviews and penetration testing focused on deserialization vulnerabilities to identify and remediate similar issues proactively. Educate development teams on secure deserialization practices to prevent recurrence.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-5679: Deserialization in Shenzhen Dashi Tongzhou Information Technology AgileBPM
Description
A vulnerability classified as critical has been found in Shenzhen Dashi Tongzhou Information Technology AgileBPM up to 2.5.0. Affected is the function parseStrByFreeMarker of the file /src/main/java/com/dstz/sys/rest/controller/SysToolsController.java. The manipulation of the argument str leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5679 is a medium-severity deserialization vulnerability affecting Shenzhen Dashi Tongzhou Information Technology's AgileBPM product versions 2.0 through 2.5.0. The vulnerability resides in the parseStrByFreeMarker function within the SysToolsController.java source file. Specifically, the flaw arises from unsafe handling of the 'str' argument, which is deserialized without proper validation or sanitization. This improper deserialization can be triggered remotely without authentication or user interaction, allowing an attacker to craft malicious input that the application will deserialize, potentially leading to arbitrary code execution or other malicious outcomes. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting a medium severity level, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is rated low individually but combined could lead to significant compromise depending on the payload. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. AgileBPM is a business process management platform used to automate and optimize enterprise workflows, making this vulnerability particularly concerning as it could allow attackers to disrupt critical business processes or gain unauthorized access to sensitive operational data.
Potential Impact
For European organizations using AgileBPM, this vulnerability poses a risk of unauthorized remote code execution or manipulation of business process workflows. Exploitation could lead to disruption of critical enterprise operations, data leakage, or unauthorized modification of process logic, impacting business continuity and compliance with data protection regulations such as GDPR. Given AgileBPM's role in managing workflows, an attacker could potentially interfere with financial processes, HR systems, or supply chain management, causing operational and reputational damage. The medium CVSS score suggests that while exploitation is feasible, the impact may be limited by the need for specific conditions or partial mitigations in place. However, the lack of authentication and user interaction requirements makes it easier for attackers to attempt exploitation at scale, increasing the threat surface for European enterprises relying on this software.
Mitigation Recommendations
Organizations should immediately identify and inventory all instances of AgileBPM versions 2.0 through 2.5.0 in their environment. Since no official patches are currently linked, it is critical to implement compensating controls such as network segmentation to restrict access to AgileBPM management interfaces, especially from untrusted networks. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious deserialization payloads targeting the parseStrByFreeMarker function. Monitor logs for anomalous input patterns or unexpected deserialization attempts. If possible, disable or restrict the vulnerable endpoint until a vendor patch is released. Engage with Shenzhen Dashi Tongzhou Information Technology for updates and apply patches promptly once available. Additionally, conduct code reviews and penetration testing focused on deserialization vulnerabilities to identify and remediate similar issues proactively. Educate development teams on secure deserialization practices to prevent recurrence.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-04T13:17:39.428Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6841ec61182aa0cae2ed1f00
Added to database: 6/5/2025, 7:13:37 PM
Last enriched: 7/7/2025, 5:01:01 PM
Last updated: 8/2/2025, 6:30:45 AM
Views: 12
Related Threats
CVE-2025-7622: CWE-918: Server-Side Request Forgery (SSRF) in Axis Communications AB AXIS Camera Station Pro
MediumCVE-2025-8314: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in emarket-design Project Management, Bug and Issue Tracking Plugin – Software Issue Manager
MediumCVE-2025-8059: CWE-862 Missing Authorization in bplugins B Blocks – The ultimate block collection
CriticalCVE-2025-8690: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in addix Simple Responsive Slider
MediumCVE-2025-8688: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ebernstein Inline Stock Quotes
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.