Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1549: Path Traversal in jishenghua jshERP

0
Medium
VulnerabilityCVE-2026-1549cvecve-2026-1549
Published: Wed Jan 28 2026 (01/28/2026, 23:02:07 UTC)
Source: CVE Database V5
Vendor/Project: jishenghua
Product: jshERP

Description

CVE-2026-1549 is a medium-severity path traversal vulnerability in jishenghua's jshERP versions up to 3. 6. It affects the PluginController component, specifically the /jshERP-boot/plugin/uploadPluginConfigFile endpoint, where manipulation of the configFile argument allows attackers to traverse directories and access unauthorized files. The vulnerability can be exploited remotely without authentication or user interaction, and a public exploit is available. Although the vendor was notified early, no patch or response has been issued yet. This flaw could lead to unauthorized disclosure of sensitive files, potentially impacting confidentiality. The CVSS 4. 0 score is 5. 3, reflecting moderate risk due to ease of exploitation but limited impact scope. European organizations using jshERP should prioritize mitigation to prevent data breaches.

AI-Powered Analysis

AILast updated: 01/28/2026, 23:20:38 UTC

Technical Analysis

CVE-2026-1549 is a path traversal vulnerability identified in the jishenghua jshERP product, affecting all versions up to 3.6. The vulnerability resides in the PluginController component, specifically within the /jshERP-boot/plugin/uploadPluginConfigFile endpoint. An attacker can manipulate the configFile parameter to perform directory traversal attacks, enabling access to files outside the intended directory scope. This can lead to unauthorized reading of sensitive configuration or system files on the server hosting the ERP application. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The vendor was informed early via an issue report but has not yet provided a patch or official response. The CVSS 4.0 base score is 5.3, indicating medium severity, with attack vector network, low attack complexity, no privileges required, and no user interaction needed. The impact primarily affects confidentiality, as attackers can read files they should not access, but does not directly affect integrity or availability. No known exploits are currently observed in the wild, but public exploit code is available, increasing the likelihood of exploitation. The vulnerability highlights the need for secure input validation and access control in ERP systems, which are critical for business operations and often contain sensitive corporate data.

Potential Impact

For European organizations using jshERP, this vulnerability poses a risk of unauthorized disclosure of sensitive business and configuration data, potentially leading to further attacks such as credential theft, espionage, or disruption of business processes. ERP systems often integrate multiple business functions, so exposure of configuration files could reveal internal network structures or credentials. The remote exploitability without authentication means attackers can target exposed ERP instances directly over the internet, increasing risk especially for organizations with insufficient perimeter defenses. Confidentiality breaches could result in regulatory non-compliance, especially under GDPR, leading to legal and financial consequences. The medium severity score reflects a moderate but tangible threat that could be leveraged in multi-stage attacks. The lack of vendor response and patch availability increases exposure time. Organizations relying on jshERP for critical operations should consider this vulnerability a priority for risk management and incident prevention.

Mitigation Recommendations

Until an official patch is released, European organizations should implement several specific mitigations: 1) Restrict network access to the /jshERP-boot/plugin/uploadPluginConfigFile endpoint using firewalls or web application firewalls (WAFs) to limit exposure to trusted IPs only. 2) Implement strict input validation and sanitization at the application or proxy level to block path traversal patterns such as '../' sequences in the configFile parameter. 3) Monitor logs for suspicious access patterns targeting the vulnerable endpoint to detect exploitation attempts early. 4) Employ network segmentation to isolate ERP servers from public networks and limit lateral movement if compromised. 5) Review and harden file system permissions on ERP servers to minimize the impact of unauthorized file access. 6) Consider deploying runtime application self-protection (RASP) tools to detect and block exploitation attempts in real time. 7) Engage with the vendor for updates and subscribe to vulnerability advisories to apply patches promptly once available. 8) Conduct internal security assessments and penetration tests focusing on ERP systems to identify other potential weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-28T16:53:00.932Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697a96554623b1157cf7780a

Added to database: 1/28/2026, 11:05:57 PM

Last enriched: 1/28/2026, 11:20:38 PM

Last updated: 1/29/2026, 1:13:34 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats