CVE-2025-7947: Improper Authorization in jshERP
A vulnerability classified as critical has been found in jshERP up to 3.5. Affected is an unknown function of the file /user/delete of the component Account Handler. The manipulation of the argument ID leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7947 is a medium-severity vulnerability identified in jshERP versions 3.0 through 3.5. The flaw exists in the Account Handler component, specifically within an unspecified function of the /user/delete endpoint. The vulnerability arises from improper authorization checks on the ID argument, allowing an attacker to manipulate this parameter to perform unauthorized actions. The attack vector is remote and does not require user interaction, but it does require some level of privileges (low privileges) to exploit. The vulnerability impacts confidentiality, integrity, and availability to a limited extent, as it allows unauthorized deletion of user accounts or related resources. The CVSS 4.0 base score is 5.3, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and limited impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. The lack of patches or official remediation guidance at the time of publication further elevates the risk for organizations using affected versions of jshERP. jshERP is an enterprise resource planning system, and compromise of user account management functions can lead to unauthorized access, data manipulation, or denial of service within the ERP environment.
Potential Impact
For European organizations using jshERP versions 3.0 to 3.5, this vulnerability poses a risk of unauthorized user account deletion or manipulation, potentially disrupting business operations and causing data integrity issues. The improper authorization could allow attackers with limited privileges to escalate their impact by removing legitimate user accounts, leading to denial of service or unauthorized access if administrative accounts are targeted. This can affect confidentiality by exposing user management processes and integrity by unauthorized modification or deletion of user data. Availability may also be impacted if critical user accounts are deleted, disrupting ERP workflows. Given the ERP system's role in managing business-critical functions such as finance, inventory, and human resources, exploitation could lead to operational downtime, financial loss, and regulatory compliance issues under GDPR if personal data is affected. The medium severity and requirement for low privileges mean that insider threats or compromised low-level accounts could be leveraged to exploit this vulnerability, increasing risk within organizations with less stringent internal access controls.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the /user/delete endpoint to only highly trusted administrative users and implementing strict access control policies. 2. Monitor logs for unusual deletion requests or patterns indicating exploitation attempts. 3. Implement multi-factor authentication (MFA) for all accounts with deletion privileges to reduce risk from compromised credentials. 4. Conduct a thorough audit of user accounts and permissions to ensure no unauthorized deletions have occurred. 5. If possible, apply custom patches or workarounds such as input validation and authorization checks on the ID parameter at the application or web server level until an official patch is released. 6. Segregate ERP network segments and limit external exposure of the jshERP management interfaces to reduce attack surface. 7. Educate administrators and users about the vulnerability and encourage prompt reporting of suspicious activity. 8. Plan for an upgrade or patch deployment as soon as an official fix becomes available from the vendor.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-7947: Improper Authorization in jshERP
Description
A vulnerability classified as critical has been found in jshERP up to 3.5. Affected is an unknown function of the file /user/delete of the component Account Handler. The manipulation of the argument ID leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7947 is a medium-severity vulnerability identified in jshERP versions 3.0 through 3.5. The flaw exists in the Account Handler component, specifically within an unspecified function of the /user/delete endpoint. The vulnerability arises from improper authorization checks on the ID argument, allowing an attacker to manipulate this parameter to perform unauthorized actions. The attack vector is remote and does not require user interaction, but it does require some level of privileges (low privileges) to exploit. The vulnerability impacts confidentiality, integrity, and availability to a limited extent, as it allows unauthorized deletion of user accounts or related resources. The CVSS 4.0 base score is 5.3, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and limited impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. The lack of patches or official remediation guidance at the time of publication further elevates the risk for organizations using affected versions of jshERP. jshERP is an enterprise resource planning system, and compromise of user account management functions can lead to unauthorized access, data manipulation, or denial of service within the ERP environment.
Potential Impact
For European organizations using jshERP versions 3.0 to 3.5, this vulnerability poses a risk of unauthorized user account deletion or manipulation, potentially disrupting business operations and causing data integrity issues. The improper authorization could allow attackers with limited privileges to escalate their impact by removing legitimate user accounts, leading to denial of service or unauthorized access if administrative accounts are targeted. This can affect confidentiality by exposing user management processes and integrity by unauthorized modification or deletion of user data. Availability may also be impacted if critical user accounts are deleted, disrupting ERP workflows. Given the ERP system's role in managing business-critical functions such as finance, inventory, and human resources, exploitation could lead to operational downtime, financial loss, and regulatory compliance issues under GDPR if personal data is affected. The medium severity and requirement for low privileges mean that insider threats or compromised low-level accounts could be leveraged to exploit this vulnerability, increasing risk within organizations with less stringent internal access controls.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the /user/delete endpoint to only highly trusted administrative users and implementing strict access control policies. 2. Monitor logs for unusual deletion requests or patterns indicating exploitation attempts. 3. Implement multi-factor authentication (MFA) for all accounts with deletion privileges to reduce risk from compromised credentials. 4. Conduct a thorough audit of user accounts and permissions to ensure no unauthorized deletions have occurred. 5. If possible, apply custom patches or workarounds such as input validation and authorization checks on the ID parameter at the application or web server level until an official patch is released. 6. Segregate ERP network segments and limit external exposure of the jshERP management interfaces to reduce attack surface. 7. Educate administrators and users about the vulnerability and encourage prompt reporting of suspicious activity. 8. Plan for an upgrade or patch deployment as soon as an official fix becomes available from the vendor.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-21T07:49:42.333Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687edf4ea83201eaac161043
Added to database: 7/22/2025, 12:46:06 AM
Last enriched: 7/29/2025, 1:31:16 AM
Last updated: 9/4/2025, 7:16:48 PM
Views: 37
Related Threats
CVE-2025-9990: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in smackcoders WordPress Helpdesk Integration
HighCVE-2025-7445: CWE-532 Insertion of Sensitive Information into Log File in Kubernetes secrets-store-sync-controller
MediumCVE-2025-58362: CWE-706: Use of Incorrectly-Resolved Name or Reference in honojs hono
HighCVE-2025-58179: CWE-918: Server-Side Request Forgery (SSRF) in withastro astro
HighCVE-2025-55739: CWE-798: Use of Hard-coded Credentials in FreePBX security-reporting
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.