CVE-2026-1546
Published: 28 January 2026
Summary
CVE-2026-1546 is a medium-severity Injection (CWE-74) vulnerability in Jishenghua Jsherp. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 5.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Penetration testing uses SQL injection payloads against database interfaces, identifying and supporting fixes for SQL injection weaknesses.
Developer assessments and testing (including injection-focused techniques) identify improper neutralization of special elements, and the verifiable flaw remediation corrects them pre-deployment.
Validates query inputs to prevent SQL syntax or command manipulation.
Identifies indicators of injection attacks (command, SQL, LDAP, etc.) via anomaly and attack monitoring.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web app component directly enables remote exploitation of the application per T1190.
NVD Description
A security vulnerability has been detected in jishenghua jshERP up to 3.6. The impacted element is the function getBillItemByParam of the file /jshERP-boot/depotItem/importItemExcel of the component com.jsh.erp.datasource.mappers.DepotItemMapperEx. The manipulation of the argument barCodes leads to sql injection. It is possible…
more
to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Deeper analysisAI
CVE-2026-1546 is a SQL injection vulnerability (CWE-74, CWE-89) affecting jishenghua jshERP versions up to 3.6. The issue resides in the getBillItemByParam function within the file /jshERP-boot/depotItem/importItemExcel of the com.jsh.erp.datasource.mappers.DepotItemMapperEx component. It is triggered by manipulation of the barCodes argument.
A remote attacker with low privileges (PR:L) can exploit this vulnerability with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation enables limited impacts on confidentiality, integrity, and availability (C:L/I:L/A:L), as reflected in its CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
Advisories indicate the project was informed early via GitHub issue #145 but has not responded. No patches or specific mitigations are detailed in the references, including VulDB entries at vuldb.com/?ctiid.343230 and vuldb.com/?id.343230.
The exploit has been publicly disclosed and may be used, with details available in the jshERP GitHub repository and related issues. No real-world exploitation is reported.
Details
- CWE(s)