CVE-2025-11140

7.3 HIGH
XXE

📋 TL;DR

This vulnerability allows remote attackers to execute XML External Entity (XXE) attacks against Bjskzy Zhiyou ERP systems up to version 11.0. By manipulating the contentString parameter in the openForm function, attackers can read sensitive files, perform server-side request forgery, or potentially execute code. Organizations using affected ERP versions are at risk.

💻 Affected Systems

Products:
  • Bjskzy Zhiyou ERP
Versions: Up to and including 11.0
Operating Systems: All platforms running the ERP software
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the vulnerable component are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including data exfiltration, remote code execution, and lateral movement within the network.

🟠

Likely Case

Sensitive file disclosure (configuration files, credentials), internal network reconnaissance, and potential data theft.

🟢

If Mitigated

Limited impact with proper network segmentation, XML parser hardening, and input validation in place.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely and public exploit code exists.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to authenticated or network-accessible attacks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires access to the vulnerable function but is technically simple to execute with available proof-of-concept.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Consider upgrading to version 11.1 or later if available, or implement workarounds.

🔧 Temporary Workarounds

Disable XXE Processing

all

Configure XML parsers to disable external entity processing

Set XML parser properties: FEATURE_SECURE_PROCESSING=true, DISALLOW_DOCTYPE_DECL=true

Input Validation Filter

all

Implement input validation to reject XML content containing external entity declarations

Implement regex filter: /<!ENTITY\s+\S+\s+SYSTEM\s+['"].*['"]>/i

🧯 If You Can't Patch

  • Network segmentation: Isolate ERP systems from sensitive networks and internet access
  • Implement WAF rules to block XXE payloads at the network perimeter

🔍 How to Verify

Check if Vulnerable:

Check ERP version via admin interface or configuration files. Versions ≤11.0 are vulnerable.

Check Version:

Check application.properties or version.txt in installation directory

Verify Fix Applied:

Test with XXE payloads to confirm parser rejects external entities. Monitor for successful exploitation attempts.

📡 Detection & Monitoring

Log Indicators:

  • XML parsing errors containing 'ENTITY' or 'SYSTEM'
  • Unexpected file read attempts from application logs
  • HTTP requests with XML payloads to vulnerable endpoints

Network Indicators:

  • HTTP POST requests containing XML with DOCTYPE declarations
  • Outbound connections to internal services from ERP system

SIEM Query:

source="erp_logs" AND ("ENTITY SYSTEM" OR "DOCTYPE" OR "xml external")

🔗 References

📤 Share & Export