Skip to main content

CVE-2025-5680: Deserialization in Shenzhen Dashi Tongzhou Information Technology AgileBPM

Medium
VulnerabilityCVE-2025-5680cvecve-2025-5680
Published: Thu Jun 05 2025 (06/05/2025, 19:31:09 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Dashi Tongzhou Information Technology
Product: AgileBPM

Description

A vulnerability classified as critical was found in Shenzhen Dashi Tongzhou Information Technology AgileBPM up to 2.5.0. Affected by this vulnerability is the function executeScript of the file /src/main/java/com/dstz/sys/rest/controller/SysScriptController.java of the component Groovy Script Handler. The manipulation of the argument script leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/07/2025, 17:11:28 UTC

Technical Analysis

CVE-2025-5680 is a medium-severity deserialization vulnerability affecting Shenzhen Dashi Tongzhou Information Technology's AgileBPM product, versions 2.0 through 2.5.0. The flaw resides in the executeScript function within the SysScriptController.java file, specifically in the Groovy Script Handler component. This vulnerability arises from improper handling of the 'script' argument, which allows an attacker to manipulate input leading to unsafe deserialization of data. Deserialization vulnerabilities can enable remote attackers to execute arbitrary code or commands on the affected system without authentication or user interaction. The vulnerability is remotely exploitable over the network, with low attack complexity and no privileges required, but it has limited impact on confidentiality, integrity, and availability. Although the CVSS 4.0 base score is 5.3 (medium), the exploit has been publicly disclosed, increasing the risk of exploitation. No known exploits are currently observed in the wild. The vulnerability does not require user interaction, and the scope is limited to the AgileBPM application. The lack of available patches or mitigations from the vendor increases the urgency for organizations to implement compensating controls.

Potential Impact

For European organizations using AgileBPM versions up to 2.5.0, this vulnerability poses a risk of remote code execution or unauthorized script execution within the BPM environment. This could lead to disruption of business process automation, unauthorized access to sensitive workflow data, or lateral movement within the network. Given AgileBPM's role in managing critical business workflows, exploitation could impact operational continuity and data integrity. However, the medium severity and limited scope reduce the likelihood of widespread catastrophic impact. Organizations in sectors relying heavily on BPM systems, such as finance, manufacturing, and public administration, may face increased operational risks. The absence of known active exploitation reduces immediate threat but the public disclosure of the exploit code raises the risk of opportunistic attacks, especially in environments lacking timely patching or mitigations.

Mitigation Recommendations

European organizations should immediately inventory their AgileBPM deployments to identify affected versions (2.0 to 2.5.0). Until a vendor patch is available, organizations should implement strict network segmentation to limit access to the AgileBPM management interfaces, restricting them to trusted internal networks and VPNs. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious deserialization payloads targeting the executeScript endpoint. Monitor logs for unusual script execution requests or anomalies in the SysScriptController activity. Disable or restrict Groovy script execution capabilities if not essential for business processes. Apply the principle of least privilege to service accounts running AgileBPM to limit potential impact. Regularly update incident response plans to include detection and containment procedures for deserialization attacks. Engage with the vendor for timely patch releases and apply updates promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-04T13:17:41.924Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6841f6f6182aa0cae2ee9c53

Added to database: 6/5/2025, 7:58:46 PM

Last enriched: 7/7/2025, 5:11:28 PM

Last updated: 8/2/2025, 4:13:21 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats