CVE Alert: CVE-2025-10092 – Jinher – OA

CVE-2025-10092

HIGHNo exploitation knownPoC observed

A vulnerability was found in Jinher OA up to 1.2. This impacts an unknown function of the file /c6/Jhsoft.Web.projectmanage/TaskManage/AddTask.aspx/?Type=add of the component XML Handler. The manipulation results in xml external entity reference. The attack can be executed remotely. The exploit has been made public and could be used.

CVSS v3.1 (7.3)
Vendor
Jinher
Product
OA
Versions
1.0 | 1.1 | 1.2
CWE
CWE-611, XML External Entity Reference
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-08T11:32:06.165Z
Updated
2025-09-08T13:33:31.403Z

AI Summary Analysis

Risk verdict

High risk: remote, unauthenticated exploitation is possible with a publicly available PoC, enabling potential data exposure or manipulation.

Why this matters

The vulnerability affects a web-facing XML handler, enabling external entity processing. This can lead to disclosure of local/internal data or server-side impact without user interaction, impacting confidentiality and potentially availability.

Most likely attack path

Attacker requires no credentials and can trigger the flaw over the network via crafted XML to the web endpoint. The XML parser would resolve external entities, risking data exfiltration or local file access; limited impact per CVSS on integrity and availability, but combined with external access and public PoC, prone to automated scanning and rapid exploitation.

Who is most exposed

Enterprise deployments of Jinher OA with web interfaces (XML Handler) on internal networks or internet-facing gateways are at risk, particularly where network segmentation is weak and admin controls are lax.

Detection ideas

  • Unusual outbound connections or file reads triggered by XML payloads to local or internal hosts.
  • Logs showing errors or exceptions referencing external entities during AddTask.aspx requests.
  • Anomalous XML payloads targeting /c6/Jhsoft.Web.projectmanage/TaskManage/AddTask.aspx/?Type=add.
  • Indicators from CTI signatures or PoC references in application logs.
  • Increased authentication failures or remote probing activity targeting the OA web interface.

Mitigation and prioritisation

  • Apply the latest vendor patch or upgrade to a fixed build; verify patch availability for all affected versions.
  • Disable or restrict external entity processing in the XML parser where feasible; harden XML handling configuration.
  • Implement network controls: restrict OA web access, add WAF rules to block XXE patterns, and monitor for suspicious XML requests.
  • Enable strict input validation and XML schema enforcement; review file access permissions.
  • Change-management: test fixes in staging before production; consider interim compensating controls if patch delays occur. If KEV is confirmed or EPSS ≥ 0.5, treat as priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.