Home

Description

EN DE

A vulnerability was identified in Bjskzy Zhiyou ERP up to 11.0. Affected by this vulnerability is the function openForm of the component com.artery.richclient.RichClientService. Such manipulation of the argument contentString leads to xml external entity reference. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Es wurde eine Schwachstelle in Bjskzy Zhiyou ERP up to 11.0 entdeckt. Dabei betrifft es die Funktion openForm der Komponente com.artery.richclient.RichClientService. Durch die Manipulation des Arguments contentString mit unbekannten Daten kann eine xml external entity reference-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Die Schwachstelle wurde öffentlich offengelegt und könnte ausgenutzt werden.

PUBLISHED Reserved 2025-09-28 | Published 2025-09-29 | Updated 2025-09-29 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
HIGH: 7.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
HIGH: 7.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
7.5AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

XML External Entity Reference

Externally Controlled Reference

Product status

11.0
affected

Timeline

2025-09-28:Advisory disclosed
2025-09-28:VulDB entry created
2025-09-28:VulDB entry last update

Credits

nu11 (VulDB User) reporter

References

vuldb.com/?id.326217 (VDB-326217 | Bjskzy Zhiyou ERP com.artery.richclient.RichClientService openForm xml external entity reference) vdb-entry technical-description

vuldb.com/?ctiid.326217 (VDB-326217 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.658090 (Submit #658090 | Beijing ShiKong-ZhiYou Technology ShiKong-ZhiYou ERP 11.0 XXE) third-party-advisory

github.com/FightingLzn9/vul/blob/main/时空智友erp-3.md exploit

cve.org (CVE-2025-11140)

nvd.nist.gov (CVE-2025-11140)

Download JSON