XML External Entity Vulnerability in Jinher OA Software
CVE-2025-10091

6.9MEDIUM

Key Information:

Vendor

Jinher

Status
Vendor
CVE Published:
8 September 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-10091?

A notable vulnerability has been identified in Jinher OA, which implicates its XML Handler component. The flaw resides in the handling of an XML external entity reference through the file '/c6/Jhsoft.Web.projectmanage/ProjectManage/XmlHttp.aspx/?Type=add'. This weakness allows an attacker to perform remote exploitation by manipulating XML documents. Given that details of the exploit have been publicly disclosed, it poses a risk to systems running the affected version of Jinher OA, making timely mitigation essential.

Affected Version(s)

OA 1.0

OA 1.1

OA 1.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

abc_123456 (VulDB User)
.
CVE-2025-10091 : XML External Entity Vulnerability in Jinher OA Software