CVE-2025-7947: Improper Authorization in jshERP
A vulnerability classified as critical has been found in jshERP up to 3.5. Affected is an unknown function of the file /user/delete of the component Account Handler. The manipulation of the argument ID leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7947 is a medium-severity vulnerability identified in jshERP versions 3.0 through 3.5. The flaw exists in the Account Handler component, specifically within an unspecified function of the /user/delete endpoint. The vulnerability arises from improper authorization checks on the ID argument, allowing an attacker to manipulate this parameter to perform unauthorized actions. The attack vector is remote and does not require user interaction, but it does require some level of privileges (low privileges) to exploit. The vulnerability impacts confidentiality, integrity, and availability to a limited extent, as it allows unauthorized deletion of user accounts or related resources. The CVSS 4.0 base score is 5.3, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and limited impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. The lack of patches or official remediation guidance at the time of publication further elevates the risk for organizations using affected versions of jshERP. jshERP is an enterprise resource planning system, and compromise of user account management functions can lead to unauthorized access, data manipulation, or denial of service within the ERP environment.
Potential Impact
For European organizations using jshERP versions 3.0 to 3.5, this vulnerability poses a risk of unauthorized user account deletion or manipulation, potentially disrupting business operations and causing data integrity issues. The improper authorization could allow attackers with limited privileges to escalate their impact by removing legitimate user accounts, leading to denial of service or unauthorized access if administrative accounts are targeted. This can affect confidentiality by exposing user management processes and integrity by unauthorized modification or deletion of user data. Availability may also be impacted if critical user accounts are deleted, disrupting ERP workflows. Given the ERP system's role in managing business-critical functions such as finance, inventory, and human resources, exploitation could lead to operational downtime, financial loss, and regulatory compliance issues under GDPR if personal data is affected. The medium severity and requirement for low privileges mean that insider threats or compromised low-level accounts could be leveraged to exploit this vulnerability, increasing risk within organizations with less stringent internal access controls.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the /user/delete endpoint to only highly trusted administrative users and implementing strict access control policies. 2. Monitor logs for unusual deletion requests or patterns indicating exploitation attempts. 3. Implement multi-factor authentication (MFA) for all accounts with deletion privileges to reduce risk from compromised credentials. 4. Conduct a thorough audit of user accounts and permissions to ensure no unauthorized deletions have occurred. 5. If possible, apply custom patches or workarounds such as input validation and authorization checks on the ID parameter at the application or web server level until an official patch is released. 6. Segregate ERP network segments and limit external exposure of the jshERP management interfaces to reduce attack surface. 7. Educate administrators and users about the vulnerability and encourage prompt reporting of suspicious activity. 8. Plan for an upgrade or patch deployment as soon as an official fix becomes available from the vendor.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-7947: Improper Authorization in jshERP
Description
A vulnerability classified as critical has been found in jshERP up to 3.5. Affected is an unknown function of the file /user/delete of the component Account Handler. The manipulation of the argument ID leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7947 is a medium-severity vulnerability identified in jshERP versions 3.0 through 3.5. The flaw exists in the Account Handler component, specifically within an unspecified function of the /user/delete endpoint. The vulnerability arises from improper authorization checks on the ID argument, allowing an attacker to manipulate this parameter to perform unauthorized actions. The attack vector is remote and does not require user interaction, but it does require some level of privileges (low privileges) to exploit. The vulnerability impacts confidentiality, integrity, and availability to a limited extent, as it allows unauthorized deletion of user accounts or related resources. The CVSS 4.0 base score is 5.3, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and limited impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. The lack of patches or official remediation guidance at the time of publication further elevates the risk for organizations using affected versions of jshERP. jshERP is an enterprise resource planning system, and compromise of user account management functions can lead to unauthorized access, data manipulation, or denial of service within the ERP environment.
Potential Impact
For European organizations using jshERP versions 3.0 to 3.5, this vulnerability poses a risk of unauthorized user account deletion or manipulation, potentially disrupting business operations and causing data integrity issues. The improper authorization could allow attackers with limited privileges to escalate their impact by removing legitimate user accounts, leading to denial of service or unauthorized access if administrative accounts are targeted. This can affect confidentiality by exposing user management processes and integrity by unauthorized modification or deletion of user data. Availability may also be impacted if critical user accounts are deleted, disrupting ERP workflows. Given the ERP system's role in managing business-critical functions such as finance, inventory, and human resources, exploitation could lead to operational downtime, financial loss, and regulatory compliance issues under GDPR if personal data is affected. The medium severity and requirement for low privileges mean that insider threats or compromised low-level accounts could be leveraged to exploit this vulnerability, increasing risk within organizations with less stringent internal access controls.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the /user/delete endpoint to only highly trusted administrative users and implementing strict access control policies. 2. Monitor logs for unusual deletion requests or patterns indicating exploitation attempts. 3. Implement multi-factor authentication (MFA) for all accounts with deletion privileges to reduce risk from compromised credentials. 4. Conduct a thorough audit of user accounts and permissions to ensure no unauthorized deletions have occurred. 5. If possible, apply custom patches or workarounds such as input validation and authorization checks on the ID parameter at the application or web server level until an official patch is released. 6. Segregate ERP network segments and limit external exposure of the jshERP management interfaces to reduce attack surface. 7. Educate administrators and users about the vulnerability and encourage prompt reporting of suspicious activity. 8. Plan for an upgrade or patch deployment as soon as an official fix becomes available from the vendor.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-21T07:49:42.333Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687edf4ea83201eaac161043
Added to database: 7/22/2025, 12:46:06 AM
Last enriched: 7/29/2025, 1:31:16 AM
Last updated: 10/20/2025, 7:10:26 PM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-5517: CWE-122 Heap-based Buffer Overflow in ABB Terra AC wallbox (UL40/80A)
MediumCVE-2025-61488: n/a
HighCVE-2025-62698: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - ExternalGuidance
MediumCVE-2025-62700: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - MultiBoilerplate Extensionmaste
MediumCVE-2025-47900: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Microchip Time Provider 4100
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.