Skip to main content

CVE-2025-7947: Improper Authorization in jshERP

Medium
VulnerabilityCVE-2025-7947cvecve-2025-7947
Published: Tue Jul 22 2025 (07/22/2025, 00:32:05 UTC)
Source: CVE Database V5
Product: jshERP

Description

A vulnerability classified as critical has been found in jshERP up to 3.5. Affected is an unknown function of the file /user/delete of the component Account Handler. The manipulation of the argument ID leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/29/2025, 01:31:16 UTC

Technical Analysis

CVE-2025-7947 is a medium-severity vulnerability identified in jshERP versions 3.0 through 3.5. The flaw exists in the Account Handler component, specifically within an unspecified function of the /user/delete endpoint. The vulnerability arises from improper authorization checks on the ID argument, allowing an attacker to manipulate this parameter to perform unauthorized actions. The attack vector is remote and does not require user interaction, but it does require some level of privileges (low privileges) to exploit. The vulnerability impacts confidentiality, integrity, and availability to a limited extent, as it allows unauthorized deletion of user accounts or related resources. The CVSS 4.0 base score is 5.3, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and limited impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. The lack of patches or official remediation guidance at the time of publication further elevates the risk for organizations using affected versions of jshERP. jshERP is an enterprise resource planning system, and compromise of user account management functions can lead to unauthorized access, data manipulation, or denial of service within the ERP environment.

Potential Impact

For European organizations using jshERP versions 3.0 to 3.5, this vulnerability poses a risk of unauthorized user account deletion or manipulation, potentially disrupting business operations and causing data integrity issues. The improper authorization could allow attackers with limited privileges to escalate their impact by removing legitimate user accounts, leading to denial of service or unauthorized access if administrative accounts are targeted. This can affect confidentiality by exposing user management processes and integrity by unauthorized modification or deletion of user data. Availability may also be impacted if critical user accounts are deleted, disrupting ERP workflows. Given the ERP system's role in managing business-critical functions such as finance, inventory, and human resources, exploitation could lead to operational downtime, financial loss, and regulatory compliance issues under GDPR if personal data is affected. The medium severity and requirement for low privileges mean that insider threats or compromised low-level accounts could be leveraged to exploit this vulnerability, increasing risk within organizations with less stringent internal access controls.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the /user/delete endpoint to only highly trusted administrative users and implementing strict access control policies. 2. Monitor logs for unusual deletion requests or patterns indicating exploitation attempts. 3. Implement multi-factor authentication (MFA) for all accounts with deletion privileges to reduce risk from compromised credentials. 4. Conduct a thorough audit of user accounts and permissions to ensure no unauthorized deletions have occurred. 5. If possible, apply custom patches or workarounds such as input validation and authorization checks on the ID parameter at the application or web server level until an official patch is released. 6. Segregate ERP network segments and limit external exposure of the jshERP management interfaces to reduce attack surface. 7. Educate administrators and users about the vulnerability and encourage prompt reporting of suspicious activity. 8. Plan for an upgrade or patch deployment as soon as an official fix becomes available from the vendor.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-21T07:49:42.333Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687edf4ea83201eaac161043

Added to database: 7/22/2025, 12:46:06 AM

Last enriched: 7/29/2025, 1:31:16 AM

Last updated: 9/4/2025, 7:16:48 PM

Views: 37

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats