CVE-2025-51744
BaseFortify
Publication date: 2025-11-25
Last updated on: 2025-12-02
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jishenghua | jsherp | to 2.3.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in jishenghua JSH_ERP version 2.3.1, specifically in the /user/addUser endpoint. It is vulnerable to fastjson deserialization attacks, which means that an attacker could exploit the way the application processes JSON data to execute malicious code or manipulate the system.
How can this vulnerability impact me? :
The vulnerability could allow an attacker to execute arbitrary code or perform unauthorized actions on the affected system by exploiting the deserialization process. This could lead to data breaches, system compromise, or other malicious activities.