CVE-2026-8320 PUBLISHED

jishenghua jshERP updatePlatformConfigByKey Endpoint UserService.java getUserByWeixinCode server-side request forgery

Assigner: VulDB
Reserved: 11.05.2026 Published: 11.05.2026 Updated: 11.05.2026

A security vulnerability has been detected in jishenghua jshERP up to 3.6. This affects the function getUserByWeixinCode of the file jshERP-boot/src/main/java/com/jsh/erp/service/UserService.java of the component updatePlatformConfigByKey Endpoint. Such manipulation of the argument weixinUrl leads to server-side request forgery. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 5.1

Product Status

Vendor jishenghua
Product jshERP
Versions
  • Version 3.0 is affected
  • Version 3.1 is affected
  • Version 3.2 is affected
  • Version 3.3 is affected
  • Version 3.4 is affected
  • Version 3.5 is affected
  • Version 3.6 is affected

Credits

  • Ana10gy (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • Server-Side Request Forgery CWE