CVE-2025-6761: Improper Neutralization of Special Elements Used in a Template Engine in Kingdee Cloud-Starry-Sky Enterprise Edition
A vulnerability was found in Kingdee Cloud-Starry-Sky Enterprise Edition 6.x/7.x/8.x/9.0. It has been rated as critical. Affected by this issue is the function plugin.buildMobilePopHtml of the file \k3\o2o\bos\webapp\action\DynamicForm 4 Action.class of the component Freemarker Engine. The manipulation leads to improper neutralization of special elements used in a template engine. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The vendor explains, that in the fixed release "Freemarker is set to 'ALLOWS_NOTHING_RESOLVER' to not parse any classes."
AI Analysis
Technical Summary
CVE-2025-6761 is a vulnerability identified in Kingdee Cloud-Starry-Sky Enterprise Edition versions 6.x through 9.0. The issue resides in the function plugin.buildMobilePopHtml within the file \k3\o2o\bos\webapp\action\DynamicForm 4 Action.class, specifically in the Freemarker template engine component. The vulnerability is caused by improper neutralization of special elements used in the template engine, which can allow an attacker to inject malicious template directives or expressions. This improper sanitization can lead to remote code execution or unauthorized data access, as the template engine may process attacker-controlled input in an unsafe manner. The vulnerability is exploitable remotely without requiring authentication or user interaction, increasing its risk profile. The vendor’s fix involves configuring Freemarker to use the 'ALLOWS_NOTHING_RESOLVER' setting, which disables parsing of any classes, effectively preventing malicious template expressions from being evaluated. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with attack vector network, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but public disclosure of the exploit code exists, raising the urgency for patching. This vulnerability affects a critical component of Kingdee’s enterprise cloud software, which is widely used for business management and ERP solutions, making it a significant risk for organizations relying on this platform.
Potential Impact
For European organizations using Kingdee Cloud-Starry-Sky Enterprise Edition, this vulnerability poses a risk of remote exploitation leading to unauthorized code execution or data leakage within their enterprise resource planning (ERP) systems. Given that ERP systems often contain sensitive financial, operational, and personal data, exploitation could result in significant confidentiality breaches, operational disruption, and potential compliance violations under GDPR. The ability to exploit this vulnerability without authentication or user interaction increases the likelihood of automated attacks or exploitation by remote threat actors. This could lead to data integrity issues, unauthorized access to business-critical functions, and potential service outages. The medium severity rating suggests that while the impact is serious, it may not result in full system compromise or widespread availability loss. However, the strategic importance of ERP systems in European enterprises means that even medium-severity vulnerabilities can have outsized operational and reputational consequences. Organizations in sectors such as manufacturing, finance, and logistics, which commonly deploy Kingdee solutions, are particularly at risk.
Mitigation Recommendations
European organizations should prioritize upgrading Kingdee Cloud-Starry-Sky Enterprise Edition to the vendor’s fixed release where Freemarker is configured with 'ALLOWS_NOTHING_RESOLVER' to prevent unsafe template parsing. Until patches are applied, organizations should implement strict input validation and sanitization on all user-supplied data that interacts with the template engine. Network-level controls such as web application firewalls (WAFs) should be configured to detect and block suspicious template injection patterns. Monitoring and logging of template engine usage and anomalous requests can help detect exploitation attempts early. Additionally, organizations should restrict network access to the affected services to trusted internal networks or VPNs to reduce exposure. Conducting regular security audits and code reviews focusing on template usage can prevent similar vulnerabilities. Finally, organizations should maintain an incident response plan tailored to ERP system compromises to quickly contain and remediate any exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-6761: Improper Neutralization of Special Elements Used in a Template Engine in Kingdee Cloud-Starry-Sky Enterprise Edition
Description
A vulnerability was found in Kingdee Cloud-Starry-Sky Enterprise Edition 6.x/7.x/8.x/9.0. It has been rated as critical. Affected by this issue is the function plugin.buildMobilePopHtml of the file \k3\o2o\bos\webapp\action\DynamicForm 4 Action.class of the component Freemarker Engine. The manipulation leads to improper neutralization of special elements used in a template engine. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The vendor explains, that in the fixed release "Freemarker is set to 'ALLOWS_NOTHING_RESOLVER' to not parse any classes."
AI-Powered Analysis
Technical Analysis
CVE-2025-6761 is a vulnerability identified in Kingdee Cloud-Starry-Sky Enterprise Edition versions 6.x through 9.0. The issue resides in the function plugin.buildMobilePopHtml within the file \k3\o2o\bos\webapp\action\DynamicForm 4 Action.class, specifically in the Freemarker template engine component. The vulnerability is caused by improper neutralization of special elements used in the template engine, which can allow an attacker to inject malicious template directives or expressions. This improper sanitization can lead to remote code execution or unauthorized data access, as the template engine may process attacker-controlled input in an unsafe manner. The vulnerability is exploitable remotely without requiring authentication or user interaction, increasing its risk profile. The vendor’s fix involves configuring Freemarker to use the 'ALLOWS_NOTHING_RESOLVER' setting, which disables parsing of any classes, effectively preventing malicious template expressions from being evaluated. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with attack vector network, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but public disclosure of the exploit code exists, raising the urgency for patching. This vulnerability affects a critical component of Kingdee’s enterprise cloud software, which is widely used for business management and ERP solutions, making it a significant risk for organizations relying on this platform.
Potential Impact
For European organizations using Kingdee Cloud-Starry-Sky Enterprise Edition, this vulnerability poses a risk of remote exploitation leading to unauthorized code execution or data leakage within their enterprise resource planning (ERP) systems. Given that ERP systems often contain sensitive financial, operational, and personal data, exploitation could result in significant confidentiality breaches, operational disruption, and potential compliance violations under GDPR. The ability to exploit this vulnerability without authentication or user interaction increases the likelihood of automated attacks or exploitation by remote threat actors. This could lead to data integrity issues, unauthorized access to business-critical functions, and potential service outages. The medium severity rating suggests that while the impact is serious, it may not result in full system compromise or widespread availability loss. However, the strategic importance of ERP systems in European enterprises means that even medium-severity vulnerabilities can have outsized operational and reputational consequences. Organizations in sectors such as manufacturing, finance, and logistics, which commonly deploy Kingdee solutions, are particularly at risk.
Mitigation Recommendations
European organizations should prioritize upgrading Kingdee Cloud-Starry-Sky Enterprise Edition to the vendor’s fixed release where Freemarker is configured with 'ALLOWS_NOTHING_RESOLVER' to prevent unsafe template parsing. Until patches are applied, organizations should implement strict input validation and sanitization on all user-supplied data that interacts with the template engine. Network-level controls such as web application firewalls (WAFs) should be configured to detect and block suspicious template injection patterns. Monitoring and logging of template engine usage and anomalous requests can help detect exploitation attempts early. Additionally, organizations should restrict network access to the affected services to trusted internal networks or VPNs to reduce exposure. Conducting regular security audits and code reviews focusing on template usage can prevent similar vulnerabilities. Finally, organizations should maintain an incident response plan tailored to ERP system compromises to quickly contain and remediate any exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-27T05:07:41.838Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 685e73ceca1063fb8757515a
Added to database: 6/27/2025, 10:34:54 AM
Last enriched: 6/27/2025, 10:50:01 AM
Last updated: 11/20/2025, 7:31:04 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
When Updates Backfire: RCE in Windows Update Health Tools
MediumCVE-2024-5154: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
HighCVE-2024-3656: Exposure of Sensitive Information to an Unauthorized Actor
HighCVE-2024-3623: Plaintext Storage of a Password
HighCVE-2024-3622: Plaintext Storage of a Password
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.