CVE-2025-11140
📋 TL;DR
This vulnerability allows remote attackers to execute XML External Entity (XXE) attacks against Bjskzy Zhiyou ERP systems up to version 11.0. By manipulating the contentString parameter in the openForm function, attackers can read sensitive files, perform server-side request forgery, or potentially execute code. Organizations using affected ERP versions are at risk.
💻 Affected Systems
- Bjskzy Zhiyou ERP
📦 What is this software?
Zhiyou Erp by Zhiyou Group
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise including data exfiltration, remote code execution, and lateral movement within the network.
Likely Case
Sensitive file disclosure (configuration files, credentials), internal network reconnaissance, and potential data theft.
If Mitigated
Limited impact with proper network segmentation, XML parser hardening, and input validation in place.
🎯 Exploit Status
Exploit requires access to the vulnerable function but is technically simple to execute with available proof-of-concept.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available - vendor did not respond to disclosure
Restart Required: No
Instructions:
No official patch available. Consider upgrading to version 11.1 or later if available, or implement workarounds.
🔧 Temporary Workarounds
Disable XXE Processing
allConfigure XML parsers to disable external entity processing
Set XML parser properties: FEATURE_SECURE_PROCESSING=true, DISALLOW_DOCTYPE_DECL=true
Input Validation Filter
allImplement input validation to reject XML content containing external entity declarations
Implement regex filter: /<!ENTITY\s+\S+\s+SYSTEM\s+['"].*['"]>/i
🧯 If You Can't Patch
- Network segmentation: Isolate ERP systems from sensitive networks and internet access
- Implement WAF rules to block XXE payloads at the network perimeter
🔍 How to Verify
Check if Vulnerable:
Check ERP version via admin interface or configuration files. Versions ≤11.0 are vulnerable.
Check Version:
Check application.properties or version.txt in installation directory
Verify Fix Applied:
Test with XXE payloads to confirm parser rejects external entities. Monitor for successful exploitation attempts.
📡 Detection & Monitoring
Log Indicators:
- XML parsing errors containing 'ENTITY' or 'SYSTEM'
- Unexpected file read attempts from application logs
- HTTP requests with XML payloads to vulnerable endpoints
Network Indicators:
- HTTP POST requests containing XML with DOCTYPE declarations
- Outbound connections to internal services from ERP system
SIEM Query:
source="erp_logs" AND ("ENTITY SYSTEM" OR "DOCTYPE" OR "xml external")