Description
A security vulnerability has been detected in jishenghua jshERP up to 3.6. This affects the function getUserByWeixinCode of the file jshERP-boot/src/main/java/com/jsh/erp/service/UserService.java of the component updatePlatformConfigByKey Endpoint. Such manipulation of the argument weixinUrl leads to server-side request forgery. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-11
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A server‑side request forgery (SSRF) vulnerability exists in the getUserByWeixinCode function of the jshERP application. By manipulating the weixinUrl argument, an attacker can instruct the server to perform HTTP requests to arbitrary URLs, including internal network resources. This can allow the attacker to make HTTP requests to internal resources that are otherwise not publicly reachable.

Affected Systems

The vulnerability affects jishenghua jshERP versions up to 3.6, specifically the updatePlatformConfigByKey endpoint that invokes getUserByWeixinCode in the UserService module. No other products or vendors are reported to be affected.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate overall severity. The EPSS score is not available, so the precise likelihood of exploitation is uncertain, but the exploit has been publicly disclosed and may be used. The vulnerability is currently not listed in the CISA KEV catalog, suggesting it has not been widely reported in operational environments. The attack is remotely accessible by supplying a crafted weixinUrl value, and it requires no additional authentication or privileged access beyond the normal API usage.

Generated by OpenCVE AI on May 11, 2026 at 23:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available patch or upgrade jshERP to a version that fixes the SSRF flaw.
  • Restrict outbound traffic from the jshERP application, allowing requests only to trusted, whitelisted domains or via an approved proxy.
  • Validate the weixinUrl parameter at the application layer, enforcing a whitelist of acceptable protocols and hostnames and rejecting any attempt to use file:, localhost, or internal IP ranges.
  • Monitor server logs for unusual outgoing requests and generate alerts for any attempts to contact non‑whitelisted URLs.

Generated by OpenCVE AI on May 11, 2026 at 23:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in jishenghua jshERP up to 3.6. This affects the function getUserByWeixinCode of the file jshERP-boot/src/main/java/com/jsh/erp/service/UserService.java of the component updatePlatformConfigByKey Endpoint. Such manipulation of the argument weixinUrl leads to server-side request forgery. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title jishenghua jshERP updatePlatformConfigByKey Endpoint UserService.java getUserByWeixinCode server-side request forgery
First Time appeared Jishenghua
Jishenghua jsherp
Weaknesses CWE-918
CPEs cpe:2.3:a:jishenghua:jsherp:*:*:*:*:*:*:*:*
Vendors & Products Jishenghua
Jishenghua jsherp
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Jishenghua Jsherp
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-11T20:27:44.656Z

Reserved: 2026-05-11T13:33:44.950Z

Link: CVE-2026-8320

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-11T20:25:48.363

Modified: 2026-05-12T16:38:54.943

Link: CVE-2026-8320

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T00:00:03Z

Weaknesses