No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in jishenghua jshERP up to 3.6. This affects the function getUserByWeixinCode of the file jshERP-boot/src/main/java/com/jsh/erp/service/UserService.java of the component updatePlatformConfigByKey Endpoint. Such manipulation of the argument weixinUrl leads to server-side request forgery. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | jishenghua jshERP updatePlatformConfigByKey Endpoint UserService.java getUserByWeixinCode server-side request forgery | |
| First Time appeared |
Jishenghua
Jishenghua jsherp |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:2.3:a:jishenghua:jsherp:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Jishenghua
Jishenghua jsherp |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-11T20:27:44.656Z
Reserved: 2026-05-11T13:33:44.950Z
Link: CVE-2026-8320
No data.
Status : Deferred
Published: 2026-05-11T20:25:48.363
Modified: 2026-05-12T16:38:54.943
Link: CVE-2026-8320
No data.
OpenCVE Enrichment
Updated: 2026-05-12T00:00:03Z