Skip to main content

CVE-2025-7947: Improper Authorization in jshERP

Medium
VulnerabilityCVE-2025-7947cvecve-2025-7947
Published: Tue Jul 22 2025 (07/22/2025, 00:32:05 UTC)
Source: CVE Database V5
Product: jshERP

Description

A vulnerability classified as critical has been found in jshERP up to 3.5. Affected is an unknown function of the file /user/delete of the component Account Handler. The manipulation of the argument ID leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/22/2025, 01:01:09 UTC

Technical Analysis

CVE-2025-7947 is a medium-severity vulnerability affecting jshERP versions 3.0 through 3.5. The flaw resides in the /user/delete endpoint of the Account Handler component, where improper authorization occurs due to insufficient validation of the 'ID' argument. This allows an attacker to remotely invoke the deletion of user accounts without proper privileges. The vulnerability does not require user interaction and can be exploited over the network with low complexity, but it does require some level of privileges (PR:L) indicating that the attacker must have limited privileges on the system. The impact includes partial loss of confidentiality, integrity, and availability, as unauthorized deletion of user accounts can disrupt operations and potentially expose sensitive user data. The CVSS 4.0 vector indicates no user interaction is needed, no scope change, and no security controls bypassed. Although an exploit has been publicly disclosed, there are no known exploits actively used in the wild at this time. No patches or fixes have been linked yet, so affected organizations must be vigilant. The vulnerability's root cause is improper authorization checks, a common security weakness that can lead to privilege escalation or unauthorized actions within the application.

Potential Impact

For European organizations using jshERP versions 3.0 to 3.5, this vulnerability poses a risk of unauthorized user account deletions, which can disrupt business processes, cause denial of service for legitimate users, and potentially lead to data integrity issues. In sectors such as manufacturing, logistics, or services where jshERP might be used for enterprise resource planning, this could impact operational continuity. The partial loss of confidentiality and integrity could also expose sensitive user information or allow attackers to manipulate user data. Given the remote exploitability and lack of required user interaction, attackers could automate attacks to cause widespread disruption. The medium severity suggests that while the vulnerability is serious, exploitation requires some privileges, limiting the ease of attack to insiders or attackers who have already compromised low-level accounts. However, the public disclosure of the exploit increases the risk of opportunistic attacks, especially if patches are not promptly applied.

Mitigation Recommendations

European organizations should immediately audit their jshERP installations to identify affected versions (3.0 to 3.5). Until official patches are released, organizations should implement strict access controls around the /user/delete endpoint, such as network-level restrictions (e.g., IP whitelisting), web application firewall (WAF) rules to detect and block suspicious requests manipulating the 'ID' parameter, and enhanced monitoring of account deletion activities. Additionally, review and tighten privilege assignments to ensure minimal necessary access is granted to users and services interacting with the ERP system. Organizations should also consider implementing multi-factor authentication (MFA) for administrative accounts to reduce the risk of privilege misuse. Regular backups of user data and account configurations should be maintained to enable recovery in case of unauthorized deletions. Finally, stay alert for official patches or updates from jshERP vendors and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-21T07:49:42.333Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687edf4ea83201eaac161043

Added to database: 7/22/2025, 12:46:06 AM

Last enriched: 7/22/2025, 1:01:09 AM

Last updated: 7/22/2025, 6:36:41 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats