Description
A security vulnerability has been detected in jishenghua jshERP up to 3.6. This affects the function getUserByWeixinCode of the file jshERP-boot/src/main/java/com/jsh/erp/service/UserService.java of the component updatePlatformConfigByKey Endpoint. Such manipulation of the argument weixinUrl leads to server-side request forgery. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Product status
3.1
3.2
3.3
3.4
3.5
3.6
Timeline
| 2026-05-11: | Advisory disclosed |
| 2026-05-11: | VulDB entry created |
| 2026-05-11: | VulDB entry last update |
Credits
Ana10gy (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/362607 (VDB-362607 | jishenghua jshERP updatePlatformConfigByKey Endpoint UserService.java getUserByWeixinCode server-side request forgery)
vuldb.com/vuln/362607/cti (VDB-362607 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/811303 (Submit #811303 | jishenghua jshERP <=3.6 SSRF)
github.com/jishenghua/jshERP/issues/152
github.com/jishenghua/jshERP/