Impact
The flaw is in the initRCForm method of the RichClientService component, where XML input is parsed without restricting external entity resolution. An attacker can supply crafted XML that forces the server to read internal files or reach out to arbitrary network destinations, exposing confidential data. Based on the description, it is inferred that this could enable server‑side request forgery. This weakness is classified as CWE‑610 and CWE‑611.
Affected Systems
Vendor Bjskzy’s Zhiyou ERP versions 11.0 and earlier are vulnerable. The issue resides in com.artery.richclient.RichClientService and affects any deployment that uses the initRCForm RPC endpoint.
Risk and Exploitability
The vulnerability carries a CVSS score of 5.3, indicating moderate severity, and an EPSS score of less than 1 %, suggesting a low likelihood of exploitation in the near future. The flaw is not listed in the CISA KEV catalog. The attack vector is remote, requiring only the ability to send XML data to the RichClientService interface; no authentication or privileged access is explicitly mentioned in the description.
OpenCVE Enrichment