CVE Alert: CVE-2025-11341 – Jinher – OA
CVE-2025-11341
A security flaw has been discovered in Jinher OA up to 2.0. This affects an unknown function of the file /c6/Jhsoft.Web.module/eformaspx/WebDesign.aspx/?type=SystemUserInfo&style=1. Performing manipulation results in xml external entity reference. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.
AI Summary Analysis
Risk verdict
High risk with remote, unauthenticated exploitation and public PoC; exploitation activity is indicated by SSVC state, so patching should be treated as urgent.
Why this matters
The flaw enables XML External Entity references, potentially leaking internal data and affecting server integrity, while offering limited but real leakage paths without user interaction. In enterprise contexts, exposed endpoints can expose configuration or credentials, widening impact across applications sharing the same XML processor.
Most likely attack path
An attacker sends crafted XML to a remote web endpoint; no user interaction is required and no local privileges are needed. The vulnerability’s partial impact on confidentiality, integrity and availability suggests data exfiltration or information disclosure rather than full compromise. With network-level access and an unchanged scope, lateral movement would depend on the attacker’s ability to access other services that rely on the compromised processor.
Who is most exposed
Organizations hosting this OA component with internet- or network-accessible interfaces or administratively exposed endpoints are most at risk, especially where XML processing is performed server-side without strict XML parsing controls.
Detection ideas
- Monitor for anomalous XML requests to the affected endpoint, including unusual DOCTYPE or entity references.
- Look for patterns typical of XXE attempts (external entity declarations, large payloads).
- Correlate spikes in data-access to the system from external sources.
- Inspect web server logs for repeated access to /WebDesign.aspx with type/style parameters.
- Enable WAF rules targeting XXE signatures and XML parsing anomalies.
Mitigation and prioritisation
- Apply the vendor patch or upgrade to a fixed release immediately; verify deployment in staging before production.
- Hardening: disable external entities and DTD processing in XML parsers; restrict network access to the OA interface.
- Implement compensating controls: WAF rules, IDS/IPS monitoring for XXE indicators, and segmentation of OA components.
- Change-management: schedule an urgent maintenance window; perform regression testing around XML processing components.
- If patching is delayed, enable strict input validation, monitor for suspected XXE traffic, and restrict outbound data exfiltration routes.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.