CVE-2025-51742
BaseFortify
Publication date: 2025-11-25
Last updated on: 2025-12-02
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jishenghua | jsherp | to 2.3.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in jishenghua JSH_ERP 2.3.1 at the /material/getMaterialEnableSerialNumberList endpoint, where the search query parameter is passed directly to the parseObject() function of Fastjson. This improper handling leads to a deserialization vulnerability that can be exploited to achieve remote code execution (RCE) using JDBC payloads.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can execute arbitrary code on the affected system remotely, potentially gaining full control over the server running jishenghua JSH_ERP 2.3.1. This can lead to data theft, system compromise, or further attacks within the network.