CVE-2025-6761

7.3 HIGH

📋 TL;DR

This critical vulnerability in Kingdee Cloud-Starry-Sky Enterprise Edition allows remote attackers to execute arbitrary code through template injection in the Freemarker Engine. The flaw enables attackers to bypass security controls and potentially take full control of affected systems. All organizations running vulnerable versions of Kingdee's enterprise software are at risk.

💻 Affected Systems

Products:
  • Kingdee Cloud-Starry-Sky Enterprise Edition
Versions: 6.x, 7.x, 8.x, 9.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Freemarker Engine component in the DynamicForm 4 Action.class file. All default installations are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Server compromise allowing data exfiltration, installation of backdoors, and disruption of business operations.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and least privilege access controls are implemented.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication, making internet-facing instances immediate targets.
🏢 Internal Only: HIGH - Even internally hosted instances are vulnerable to internal threats or attackers who breach perimeter defenses.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed, making weaponization highly probable. The vulnerability requires minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed release with Freemarker set to 'ALLOWS_NOTHING_RESOLVER'

Vendor Advisory: https://vip.kingdee.com/link/s/ZlWX7

Restart Required: Yes

Instructions:

1. Download the latest patched version from Kingdee's official portal. 2. Backup current installation and data. 3. Apply the patch following Kingdee's upgrade documentation. 4. Restart the application services. 5. Verify the fix is applied.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to the vulnerable component using firewall rules

# Example iptables rule to restrict access
# iptables -A INPUT -p tcp --dport [application_port] -s [trusted_ips] -j ACCEPT
# iptables -A INPUT -p tcp --dport [application_port] -j DROP

WAF Rule Implementation

all

Deploy web application firewall rules to block template injection attempts

# Example ModSecurity rule
# SecRule ARGS "@rx \$\{[^}]+\}" "id:1001,phase:2,deny,msg:'Freemarker template injection attempt'

🧯 If You Can't Patch

  • Isolate affected systems in a segmented network zone with strict access controls
  • Implement application-level monitoring and alerting for suspicious template engine activity

🔍 How to Verify

Check if Vulnerable:

Check if running Kingdee Cloud-Starry-Sky Enterprise Edition versions 6.x-9.0 and examine the Freemarker configuration for ALLOWS_NOTHING_RESOLVER setting.

Check Version:

# Check Kingdee version via application interface or configuration files
# grep -r "version" /path/to/kingdee/installation/ | grep -i "6\|7\|8\|9.0"

Verify Fix Applied:

Verify the Freemarker Engine configuration shows 'ALLOWS_NOTHING_RESOLVER' is enabled and test with known exploit payloads that should be blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual template processing errors
  • Freemarker engine exceptions containing user input
  • Multiple failed template parsing attempts from single IP

Network Indicators:

  • HTTP requests containing ${...} patterns in parameters
  • Unusual outbound connections from application server

SIEM Query:

source="kingdee_logs" AND ("Freemarker" OR "template" OR "${*") AND (error OR exception OR failed)

🔗 References

📤 Share & Export