CVE-2025-60801

jshERP · jshERP Multiple Products

A critical vulnerability has been discovered in multiple jshERP products, allowing an unauthenticated attacker to remotely execute arbitrary code on the server.

Executive summary

A critical vulnerability has been discovered in multiple jshERP products, allowing an unauthenticated attacker to remotely execute arbitrary code on the server. Successful exploitation could lead to a complete system compromise, enabling an attacker to steal sensitive data, disrupt business operations, or use the server for further malicious activities. Immediate patching of all affected systems is required to mitigate this high-severity risk.

Vulnerability

The vulnerability is an unauthenticated Remote Code Execution (RCE) flaw within the jsh_erp function. An attacker can exploit this weakness by sending a specially crafted, unauthenticated request to an exposed application endpoint that utilizes this function. The application fails to properly sanitize the input, allowing the attacker's malicious payload to be executed on the underlying server with the privileges of the jshERP service account.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.2. Exploitation by a remote, unauthenticated attacker could result in a complete compromise of the affected server. The potential business impact includes theft of sensitive corporate or customer data, deployment of ransomware, disruption of critical business services relying on the ERP system, and reputational damage. A compromised system could also be used as a pivot point to launch further attacks against the internal network, escalating the security incident.

Remediation

Immediate Action:

  • Immediately apply the security patches provided by the vendor to all affected jshERP instances.
  • Prioritize patching for all internet-facing systems, as they are the most exposed to attack.
  • After patching, carefully review web server and application access logs for any signs of exploitation attempts that may have occurred before the patch was applied.

Proactive Monitoring:

  • Monitor web server access logs for unusual or malformed requests targeting endpoints related to the jsh_erp function.
  • Implement monitoring for unexpected child processes being spawned by the jshERP application process.
  • Scrutinize outbound network traffic from the jshERP server for connections to unknown or suspicious IP addresses, which could indicate a successful compromise.

Compensating Controls:

  • If immediate patching is not feasible, implement a Web Application Firewall (WAF) with a virtual patching rule to inspect and block malicious requests targeting the vulnerable function.
  • Restrict network access to the jshERP application to only trusted IP addresses and networks.
  • Enhance egress filtering on the server's firewall to prevent it from establishing outbound connections to the internet, limiting an attacker's ability to establish a command-and-control channel.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.2 and the critical impact of a potential remote code execution attack, immediate remediation is strongly recommended. Although this vulnerability is not yet listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity and the ease of exploitation for an unauthenticated attacker make it a prime target. Organizations must prioritize applying the vendor-supplied patches to all affected jshERP systems, starting with those exposed to the internet, to prevent a full system compromise.