Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1218: XML External Entity Reference in Bjskzy Zhiyou ERP

0
Medium
VulnerabilityCVE-2026-1218cvecve-2026-1218
Published: Tue Jan 20 2026 (01/20/2026, 05:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Bjskzy
Product: Zhiyou ERP

Description

A vulnerability was detected in Bjskzy Zhiyou ERP up to 11.0. Impacted is the function initRCForm of the file RichClientService.class of the component com.artery.richclient.RichClientService. Performing a manipulation results in xml external entity reference. The attack is possible to be carried out remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:22:07 UTC

Technical Analysis

CVE-2026-1218 is an XML External Entity (XXE) vulnerability affecting Bjskzy Zhiyou ERP up to version 11.0. The flaw resides in the initRCForm function within the RichClientService.class file of the com.artery.richclient.RichClientService component. An attacker can remotely send crafted XML input that includes malicious external entity references. When processed, this can lead to disclosure of internal files, internal network scanning, or denial of service by exhausting resources. The vulnerability does not require authentication or user interaction, increasing its risk profile. The vendor was contacted but has not responded or released a patch, while exploit code is publicly available, raising the likelihood of exploitation attempts. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and limited impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). This suggests attackers can gain some sensitive information or cause limited disruption but not full system compromise. The lack of vendor response and public exploit availability necessitates urgent defensive measures by affected organizations.

Potential Impact

The primary impact of this XXE vulnerability is unauthorized disclosure of sensitive internal files or data, which can lead to information leakage and potential exposure of credentials or configuration files. Additionally, attackers may leverage the vulnerability to perform server-side request forgery (SSRF) or internal network reconnaissance, increasing the risk of lateral movement within the victim's environment. Resource exhaustion attacks could cause denial of service, impacting availability of the ERP system. Since the vulnerability is remotely exploitable without authentication or user interaction, it poses a significant risk to organizations relying on Bjskzy Zhiyou ERP 11.0 for critical business operations. Data confidentiality and system availability are the most affected security properties, potentially disrupting business processes and causing financial or reputational damage. The absence of a vendor patch and public exploit code further elevates the threat level.

Mitigation Recommendations

1. Immediately disable external entity processing in all XML parsers used by the Zhiyou ERP system, if configurable. 2. Implement strict input validation and sanitization on all XML inputs to prevent malicious entity declarations. 3. Employ XML parsing libraries that are hardened against XXE attacks or use safer data formats where possible. 4. Segment the ERP system network to limit exposure and restrict outbound network access from the ERP server to prevent SSRF exploitation. 5. Monitor logs for suspicious XML payloads or unusual outbound connections indicative of exploitation attempts. 6. If possible, deploy web application firewalls (WAFs) with rules to detect and block XXE attack patterns. 7. Engage with the vendor for updates or patches and consider alternative ERP solutions if no remediation is forthcoming. 8. Conduct regular security assessments and penetration tests focusing on XML processing components. 9. Educate development and operations teams about secure XML handling practices to prevent similar vulnerabilities in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-19T23:19:20.859Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696f143c4623b1157c18a4f5

Added to database: 1/20/2026, 5:35:56 AM

Last enriched: 2/23/2026, 10:22:07 PM

Last updated: 3/24/2026, 10:37:43 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses