An issue was discovered in jishenghua JSH_ERP 2.3.1. The /material/getMaterialEnableSerialNumberList endpoint passes the search query parameter directly to parseObject(), introducing a Fastjson deserialization vulnerability that can lead to RCE via JDBC payloads.
References
| Link | Resource |
|---|---|
| https://blog.hackpax.top/jsh-erp/ | Broken Link |
| https://gist.github.com/Paxsizy/a40334ffa7f05c42bf0348833f830108 | Third Party Advisory |
| https://gitee.com/jishenghua | Product |
| https://gitee.com/jishenghua/JSH_ERP | Product |
Configurations
History
No history.
Information
Published : 2025-11-25 20:15
Updated : 2025-12-02 15:38
NVD link : CVE-2025-51742
Mitre link : CVE-2025-51742
CVE.ORG link : CVE-2025-51742
JSON object : View
Products Affected
jishenghua
- jsherp
CWE
CWE-502
Deserialization of Untrusted Data
