Cyber Posture

CVE-2026-1546

MediumPublic PoC

Published: 28 January 2026

Published
28 January 2026
Modified
09 February 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0002 5.9th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-1546 is a medium-severity Injection (CWE-74) vulnerability in Jishenghua Jsherp. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 5.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-89

Penetration testing uses SQL injection payloads against database interfaces, identifying and supporting fixes for SQL injection weaknesses.

addresses: CWE-74

Developer assessments and testing (including injection-focused techniques) identify improper neutralization of special elements, and the verifiable flaw remediation corrects them pre-deployment.

addresses: CWE-89

Validates query inputs to prevent SQL syntax or command manipulation.

addresses: CWE-74

Identifies indicators of injection attacks (command, SQL, LDAP, etc.) via anomaly and attack monitoring.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in public-facing web app component directly enables remote exploitation of the application per T1190.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A security vulnerability has been detected in jishenghua jshERP up to 3.6. The impacted element is the function getBillItemByParam of the file /jshERP-boot/depotItem/importItemExcel of the component com.jsh.erp.datasource.mappers.DepotItemMapperEx. The manipulation of the argument barCodes leads to sql injection. It is possible…

more

to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Deeper analysisAI

CVE-2026-1546 is a SQL injection vulnerability (CWE-74, CWE-89) affecting jishenghua jshERP versions up to 3.6. The issue resides in the getBillItemByParam function within the file /jshERP-boot/depotItem/importItemExcel of the com.jsh.erp.datasource.mappers.DepotItemMapperEx component. It is triggered by manipulation of the barCodes argument.

A remote attacker with low privileges (PR:L) can exploit this vulnerability with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation enables limited impacts on confidentiality, integrity, and availability (C:L/I:L/A:L), as reflected in its CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

Advisories indicate the project was informed early via GitHub issue #145 but has not responded. No patches or specific mitigations are detailed in the references, including VulDB entries at vuldb.com/?ctiid.343230 and vuldb.com/?id.343230.

The exploit has been publicly disclosed and may be used, with details available in the jshERP GitHub repository and related issues. No real-world exploitation is reported.

Details

CWE(s)

Affected Products

jishenghua
jsherp
≤ 3.6

CVEs Like This One

CVE-2025-51743Same product: Jishenghua Jsherp
CVE-2025-51742Same product: Jishenghua Jsherp
CVE-2025-51744Same product: Jishenghua Jsherp
CVE-2025-51746Same product: Jishenghua Jsherp
CVE-2025-51745Same product: Jishenghua Jsherp
CVE-2025-60801Same product: Jishenghua Jsherp
CVE-2025-7947Same product: Jishenghua Jsherp
CVE-2026-4844Shared CWE-74, CWE-89
CVE-2025-0698Shared CWE-74, CWE-89
CVE-2026-3790Shared CWE-74, CWE-89

References