Skip to main content

CVE-2025-7566: Path Traversal in jshERP

Medium
VulnerabilityCVE-2025-7566cvecve-2025-7566
Published: Mon Jul 14 2025 (07/14/2025, 03:02:05 UTC)
Source: CVE Database V5
Product: jshERP

Description

A vulnerability has been found in jshERP up to 3.5 and classified as critical. This vulnerability affects the function exportExcelByParam of the file /src/main/java/com/jsh/erp/controller/SystemConfigController.java. The manipulation of the argument Title leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/14/2025, 03:46:35 UTC

Technical Analysis

CVE-2025-7566 is a path traversal vulnerability identified in jshERP versions up to 3.5, specifically within the exportExcelByParam function of the SystemConfigController.java source file. This vulnerability arises from improper validation or sanitization of the 'Title' parameter, which an attacker can manipulate to traverse directories on the server's filesystem. By exploiting this flaw, an attacker can potentially access sensitive files outside the intended directory scope, leading to unauthorized disclosure of confidential information. The vulnerability can be triggered remotely without requiring user interaction, but it does require high privileges (PR:H) on the system, indicating that the attacker must have some level of authenticated access with elevated permissions. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and no privileges required (PR:H), with low impact on confidentiality, integrity, and availability. Although the vendor was notified, no patch or response has been provided, and no known exploits are currently in the wild. The public disclosure of the exploit code increases the risk of exploitation, especially in environments where jshERP is deployed without mitigation.

Potential Impact

For European organizations using jshERP versions 3.0 through 3.5, this vulnerability poses a risk of unauthorized access to sensitive files on ERP servers. Given that ERP systems often contain critical business data, including financial records, employee information, and operational details, exploitation could lead to data breaches, intellectual property theft, or disruption of business processes. The requirement for high privileges reduces the risk from external unauthenticated attackers but elevates the threat from insider threats or compromised accounts with elevated access. The path traversal could also be leveraged as a stepping stone for further attacks, such as privilege escalation or lateral movement within the network. The lack of vendor response and patches increases the urgency for organizations to implement compensating controls. The medium severity rating reflects the moderate impact and exploitation complexity, but the critical nature of ERP data means the practical impact could be significant if exploited.

Mitigation Recommendations

European organizations should immediately audit their jshERP deployments to identify affected versions (3.0 to 3.5). Since no official patch is available, organizations should implement strict access controls to limit who can access the exportExcelByParam function or the affected controller. Network segmentation should be enforced to restrict ERP system access to trusted users only. Monitoring and logging of access to the exportExcelByParam endpoint should be enhanced to detect abnormal usage patterns indicative of exploitation attempts. Input validation and sanitization can be implemented at the web application firewall (WAF) level to block suspicious 'Title' parameter values containing directory traversal sequences (e.g., '../'). Additionally, organizations should consider deploying runtime application self-protection (RASP) solutions to detect and block path traversal attempts in real time. If feasible, upgrading to a non-vulnerable version or migrating to alternative ERP solutions should be planned. Finally, user privilege reviews should be conducted to ensure minimal necessary access rights are granted, reducing the risk posed by compromised high-privilege accounts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-12T21:16:58.416Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68747a01a83201eaacc15730

Added to database: 7/14/2025, 3:31:13 AM

Last enriched: 7/14/2025, 3:46:35 AM

Last updated: 7/16/2025, 9:20:09 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats