Skip to main content

CVE-2025-6761: Improper Neutralization of Special Elements Used in a Template Engine in Kingdee Cloud-Starry-Sky Enterprise Edition

Medium
VulnerabilityCVE-2025-6761cvecve-2025-6761
Published: Fri Jun 27 2025 (06/27/2025, 10:31:09 UTC)
Source: CVE Database V5
Vendor/Project: Kingdee
Product: Cloud-Starry-Sky Enterprise Edition

Description

A vulnerability was found in Kingdee Cloud-Starry-Sky Enterprise Edition 6.x/7.x/8.x/9.0. It has been rated as critical. Affected by this issue is the function plugin.buildMobilePopHtml of the file \k3\o2o\bos\webapp\action\DynamicForm 4 Action.class of the component Freemarker Engine. The manipulation leads to improper neutralization of special elements used in a template engine. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The vendor explains, that in the fixed release "Freemarker is set to 'ALLOWS_NOTHING_RESOLVER' to not parse any classes."

AI-Powered Analysis

AILast updated: 06/27/2025, 10:50:01 UTC

Technical Analysis

CVE-2025-6761 is a vulnerability identified in Kingdee Cloud-Starry-Sky Enterprise Edition versions 6.x through 9.0. The issue resides in the function plugin.buildMobilePopHtml within the file \k3\o2o\bos\webapp\action\DynamicForm 4 Action.class, specifically in the Freemarker template engine component. The vulnerability is caused by improper neutralization of special elements used in the template engine, which can allow an attacker to inject malicious template directives or expressions. This improper sanitization can lead to remote code execution or unauthorized data access, as the template engine may process attacker-controlled input in an unsafe manner. The vulnerability is exploitable remotely without requiring authentication or user interaction, increasing its risk profile. The vendor’s fix involves configuring Freemarker to use the 'ALLOWS_NOTHING_RESOLVER' setting, which disables parsing of any classes, effectively preventing malicious template expressions from being evaluated. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with attack vector network, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but public disclosure of the exploit code exists, raising the urgency for patching. This vulnerability affects a critical component of Kingdee’s enterprise cloud software, which is widely used for business management and ERP solutions, making it a significant risk for organizations relying on this platform.

Potential Impact

For European organizations using Kingdee Cloud-Starry-Sky Enterprise Edition, this vulnerability poses a risk of remote exploitation leading to unauthorized code execution or data leakage within their enterprise resource planning (ERP) systems. Given that ERP systems often contain sensitive financial, operational, and personal data, exploitation could result in significant confidentiality breaches, operational disruption, and potential compliance violations under GDPR. The ability to exploit this vulnerability without authentication or user interaction increases the likelihood of automated attacks or exploitation by remote threat actors. This could lead to data integrity issues, unauthorized access to business-critical functions, and potential service outages. The medium severity rating suggests that while the impact is serious, it may not result in full system compromise or widespread availability loss. However, the strategic importance of ERP systems in European enterprises means that even medium-severity vulnerabilities can have outsized operational and reputational consequences. Organizations in sectors such as manufacturing, finance, and logistics, which commonly deploy Kingdee solutions, are particularly at risk.

Mitigation Recommendations

European organizations should prioritize upgrading Kingdee Cloud-Starry-Sky Enterprise Edition to the vendor’s fixed release where Freemarker is configured with 'ALLOWS_NOTHING_RESOLVER' to prevent unsafe template parsing. Until patches are applied, organizations should implement strict input validation and sanitization on all user-supplied data that interacts with the template engine. Network-level controls such as web application firewalls (WAFs) should be configured to detect and block suspicious template injection patterns. Monitoring and logging of template engine usage and anomalous requests can help detect exploitation attempts early. Additionally, organizations should restrict network access to the affected services to trusted internal networks or VPNs to reduce exposure. Conducting regular security audits and code reviews focusing on template usage can prevent similar vulnerabilities. Finally, organizations should maintain an incident response plan tailored to ERP system compromises to quickly contain and remediate any exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-27T05:07:41.838Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685e73ceca1063fb8757515a

Added to database: 6/27/2025, 10:34:54 AM

Last enriched: 6/27/2025, 10:50:01 AM

Last updated: 8/17/2025, 10:39:59 AM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats