Skip to main content

CVE-2025-5679: Deserialization in Shenzhen Dashi Tongzhou Information Technology AgileBPM

Medium
VulnerabilityCVE-2025-5679cvecve-2025-5679
Published: Thu Jun 05 2025 (06/05/2025, 19:00:23 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Dashi Tongzhou Information Technology
Product: AgileBPM

Description

A vulnerability classified as critical has been found in Shenzhen Dashi Tongzhou Information Technology AgileBPM up to 2.5.0. Affected is the function parseStrByFreeMarker of the file /src/main/java/com/dstz/sys/rest/controller/SysToolsController.java. The manipulation of the argument str leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/07/2025, 17:01:01 UTC

Technical Analysis

CVE-2025-5679 is a medium-severity deserialization vulnerability affecting Shenzhen Dashi Tongzhou Information Technology's AgileBPM product versions 2.0 through 2.5.0. The vulnerability resides in the parseStrByFreeMarker function within the SysToolsController.java source file. Specifically, the flaw arises from unsafe handling of the 'str' argument, which is deserialized without proper validation or sanitization. This improper deserialization can be triggered remotely without authentication or user interaction, allowing an attacker to craft malicious input that the application will deserialize, potentially leading to arbitrary code execution or other malicious outcomes. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting a medium severity level, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is rated low individually but combined could lead to significant compromise depending on the payload. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. AgileBPM is a business process management platform used to automate and optimize enterprise workflows, making this vulnerability particularly concerning as it could allow attackers to disrupt critical business processes or gain unauthorized access to sensitive operational data.

Potential Impact

For European organizations using AgileBPM, this vulnerability poses a risk of unauthorized remote code execution or manipulation of business process workflows. Exploitation could lead to disruption of critical enterprise operations, data leakage, or unauthorized modification of process logic, impacting business continuity and compliance with data protection regulations such as GDPR. Given AgileBPM's role in managing workflows, an attacker could potentially interfere with financial processes, HR systems, or supply chain management, causing operational and reputational damage. The medium CVSS score suggests that while exploitation is feasible, the impact may be limited by the need for specific conditions or partial mitigations in place. However, the lack of authentication and user interaction requirements makes it easier for attackers to attempt exploitation at scale, increasing the threat surface for European enterprises relying on this software.

Mitigation Recommendations

Organizations should immediately identify and inventory all instances of AgileBPM versions 2.0 through 2.5.0 in their environment. Since no official patches are currently linked, it is critical to implement compensating controls such as network segmentation to restrict access to AgileBPM management interfaces, especially from untrusted networks. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious deserialization payloads targeting the parseStrByFreeMarker function. Monitor logs for anomalous input patterns or unexpected deserialization attempts. If possible, disable or restrict the vulnerable endpoint until a vendor patch is released. Engage with Shenzhen Dashi Tongzhou Information Technology for updates and apply patches promptly once available. Additionally, conduct code reviews and penetration testing focused on deserialization vulnerabilities to identify and remediate similar issues proactively. Educate development teams on secure deserialization practices to prevent recurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-04T13:17:39.428Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6841ec61182aa0cae2ed1f00

Added to database: 6/5/2025, 7:13:37 PM

Last enriched: 7/7/2025, 5:01:01 PM

Last updated: 8/2/2025, 6:30:45 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats