CVE-2025-5680: Deserialization in Shenzhen Dashi Tongzhou Information Technology AgileBPM
A vulnerability classified as critical was found in Shenzhen Dashi Tongzhou Information Technology AgileBPM up to 2.5.0. Affected by this vulnerability is the function executeScript of the file /src/main/java/com/dstz/sys/rest/controller/SysScriptController.java of the component Groovy Script Handler. The manipulation of the argument script leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5680 is a medium-severity deserialization vulnerability affecting Shenzhen Dashi Tongzhou Information Technology's AgileBPM product, versions 2.0 through 2.5.0. The flaw resides in the executeScript function within the SysScriptController.java file, specifically in the Groovy Script Handler component. This vulnerability arises from improper handling of the 'script' argument, which allows an attacker to manipulate input leading to unsafe deserialization of data. Deserialization vulnerabilities can enable remote attackers to execute arbitrary code or commands on the affected system without authentication or user interaction. The vulnerability is remotely exploitable over the network, with low attack complexity and no privileges required, but it has limited impact on confidentiality, integrity, and availability. Although the CVSS 4.0 base score is 5.3 (medium), the exploit has been publicly disclosed, increasing the risk of exploitation. No known exploits are currently observed in the wild. The vulnerability does not require user interaction, and the scope is limited to the AgileBPM application. The lack of available patches or mitigations from the vendor increases the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations using AgileBPM versions up to 2.5.0, this vulnerability poses a risk of remote code execution or unauthorized script execution within the BPM environment. This could lead to disruption of business process automation, unauthorized access to sensitive workflow data, or lateral movement within the network. Given AgileBPM's role in managing critical business workflows, exploitation could impact operational continuity and data integrity. However, the medium severity and limited scope reduce the likelihood of widespread catastrophic impact. Organizations in sectors relying heavily on BPM systems, such as finance, manufacturing, and public administration, may face increased operational risks. The absence of known active exploitation reduces immediate threat but the public disclosure of the exploit code raises the risk of opportunistic attacks, especially in environments lacking timely patching or mitigations.
Mitigation Recommendations
European organizations should immediately inventory their AgileBPM deployments to identify affected versions (2.0 to 2.5.0). Until a vendor patch is available, organizations should implement strict network segmentation to limit access to the AgileBPM management interfaces, restricting them to trusted internal networks and VPNs. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious deserialization payloads targeting the executeScript endpoint. Monitor logs for unusual script execution requests or anomalies in the SysScriptController activity. Disable or restrict Groovy script execution capabilities if not essential for business processes. Apply the principle of least privilege to service accounts running AgileBPM to limit potential impact. Regularly update incident response plans to include detection and containment procedures for deserialization attacks. Engage with the vendor for timely patch releases and apply updates promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-5680: Deserialization in Shenzhen Dashi Tongzhou Information Technology AgileBPM
Description
A vulnerability classified as critical was found in Shenzhen Dashi Tongzhou Information Technology AgileBPM up to 2.5.0. Affected by this vulnerability is the function executeScript of the file /src/main/java/com/dstz/sys/rest/controller/SysScriptController.java of the component Groovy Script Handler. The manipulation of the argument script leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5680 is a medium-severity deserialization vulnerability affecting Shenzhen Dashi Tongzhou Information Technology's AgileBPM product, versions 2.0 through 2.5.0. The flaw resides in the executeScript function within the SysScriptController.java file, specifically in the Groovy Script Handler component. This vulnerability arises from improper handling of the 'script' argument, which allows an attacker to manipulate input leading to unsafe deserialization of data. Deserialization vulnerabilities can enable remote attackers to execute arbitrary code or commands on the affected system without authentication or user interaction. The vulnerability is remotely exploitable over the network, with low attack complexity and no privileges required, but it has limited impact on confidentiality, integrity, and availability. Although the CVSS 4.0 base score is 5.3 (medium), the exploit has been publicly disclosed, increasing the risk of exploitation. No known exploits are currently observed in the wild. The vulnerability does not require user interaction, and the scope is limited to the AgileBPM application. The lack of available patches or mitigations from the vendor increases the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations using AgileBPM versions up to 2.5.0, this vulnerability poses a risk of remote code execution or unauthorized script execution within the BPM environment. This could lead to disruption of business process automation, unauthorized access to sensitive workflow data, or lateral movement within the network. Given AgileBPM's role in managing critical business workflows, exploitation could impact operational continuity and data integrity. However, the medium severity and limited scope reduce the likelihood of widespread catastrophic impact. Organizations in sectors relying heavily on BPM systems, such as finance, manufacturing, and public administration, may face increased operational risks. The absence of known active exploitation reduces immediate threat but the public disclosure of the exploit code raises the risk of opportunistic attacks, especially in environments lacking timely patching or mitigations.
Mitigation Recommendations
European organizations should immediately inventory their AgileBPM deployments to identify affected versions (2.0 to 2.5.0). Until a vendor patch is available, organizations should implement strict network segmentation to limit access to the AgileBPM management interfaces, restricting them to trusted internal networks and VPNs. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious deserialization payloads targeting the executeScript endpoint. Monitor logs for unusual script execution requests or anomalies in the SysScriptController activity. Disable or restrict Groovy script execution capabilities if not essential for business processes. Apply the principle of least privilege to service accounts running AgileBPM to limit potential impact. Regularly update incident response plans to include detection and containment procedures for deserialization attacks. Engage with the vendor for timely patch releases and apply updates promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-04T13:17:41.924Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6841f6f6182aa0cae2ee9c53
Added to database: 6/5/2025, 7:58:46 PM
Last enriched: 7/7/2025, 5:11:28 PM
Last updated: 11/20/2025, 10:38:55 AM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62346: CWE-352 Cross-Site Request Forgery (CSRF) in HCL Software Glovius Cloud
MediumCVE-2025-11676: CWE-20 Improper Input Validation in TP-Link System Inc. TL-WR940N V6
HighCVE-2024-4438: Uncontrolled Resource Consumption
HighCVE-2024-4437: Uncontrolled Resource Consumption
HighCVE-2023-3899: Improper Authorization in Red Hat Red Hat Enterprise Linux 7
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.