CVE-2025-7523

7.3 HIGH
XXE

📋 TL;DR

This vulnerability in Jinher OA 1.0 allows attackers to perform XML External Entity (XXE) attacks through the /c6/Jhsoft.Web.message/ToolBar/DelTemp.aspx endpoint. This can lead to unauthorized data access, server-side request forgery, or denial of service. Organizations using Jinher OA 1.0 are affected.

💻 Affected Systems

Products:
  • Jinher OA
Versions: 1.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Specific configurations may affect exploitability, but default installations appear vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including sensitive data exfiltration, internal network reconnaissance, and potential remote code execution via XXE.

🟠

Likely Case

Unauthorized access to sensitive files on the server, disclosure of internal system information, and potential denial of service.

🟢

If Mitigated

Limited impact with proper XML parser hardening, network segmentation, and input validation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub demonstrates remote exploitation without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Disable XXE in XML parser

windows

Configure XML parser to disable external entity processing

Set XmlResolver property to null in .NET XML parsers
Disable DTD processing in XML configuration

Block vulnerable endpoint

windows

Restrict access to /c6/Jhsoft.Web.message/ToolBar/DelTemp.aspx

Add URL rewrite rule in IIS to block the path
Configure firewall rules to block requests to this endpoint

🧯 If You Can't Patch

  • Implement network segmentation to isolate Jinher OA systems
  • Deploy web application firewall with XXE protection rules

🔍 How to Verify

Check if Vulnerable:

Test the /c6/Jhsoft.Web.message/ToolBar/DelTemp.aspx endpoint with XXE payloads from the public PoC

Check Version:

Check Jinher OA version in application interface or configuration files

Verify Fix Applied:

Verify XML parser configuration disables external entities and test endpoint with XXE payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML payloads in web server logs
  • Requests to DelTemp.aspx with XML content
  • Error logs showing XML parsing failures

Network Indicators:

  • HTTP requests containing XML external entity declarations
  • Outbound connections from server to unexpected external systems

SIEM Query:

source="web_server" AND (uri="*DelTemp.aspx" OR body="*<!ENTITY*")

🔗 References

📤 Share & Export