frappe CVE Vulnerabilities & Metrics

Focus on frappe vulnerabilities and metrics.

Last updated: 25 Nov 2025, 23:25 UTC

About frappe Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with frappe. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total frappe CVEs: 71
Earliest CVE date: 05 Oct 2017, 01:29 UTC
Latest CVE date: 12 Nov 2025, 23:15 UTC

Latest CVE reference: CVE-2025-64707

Rolling Stats

30-day Count (Rolling): 4
365-day Count (Rolling): 36

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -76.47%
Year Variation (Calendar): 800.0%

Month Growth Rate (30-day Rolling): -76.47%
Year Growth Rate (365-day Rolling): 800.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical frappe CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.81

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 49
4.0-6.9 21
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS frappe CVEs

These are the five CVEs with the highest CVSS scores for frappe, sorted by severity first and recency.

All CVEs for frappe

CVE-2025-64707 frappe vulnerability CVSS: 0 12 Nov 2025, 23:15 UTC

Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, when admins revoked a role from the user, the effect was not immediate because of caching. The issue has been fixed in version 2.41.0 by ensuring the cache is cleared after roles are updated.

CVE-2025-64705 frappe vulnerability CVSS: 0 12 Nov 2025, 23:15 UTC

Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, users were able to access the submissions made by other students The issue has been fixed in version 2.41.0 by ensuring proper roles and redirecting if accessed via direct URL.

CVE-2025-62779 frappe vulnerability CVSS: 0 27 Oct 2025, 22:15 UTC

Frappe Learning is a learning system that helps users structure their content. In Frappe Learning 2.39.1 and earlier, users were able to add HTML through input fields in the Job Form.

CVE-2025-62778 frappe vulnerability CVSS: 0 27 Oct 2025, 22:15 UTC

Frappe Learning is a learning management system. A security issue was identified in Frappe Learning 2.39.1 and earlier, where students were able to access the Quiz Form if they had the URL.

CVE-2025-62407 frappe vulnerability CVSS: 0 16 Oct 2025, 18:15 UTC

Frappe is a full-stack web application framework. Prior to 14.98.0 and 15.83.0, an open redirect was possible through the redirect argument on the login page, if a specific type of URL was passed in. This vulnerability is fixed in 14.98.0 and 15.83.0.

CVE-2025-62158 frappe vulnerability CVSS: 0 10 Oct 2025, 20:15 UTC

Frappe Learning is a learning system that helps users structure their content. In versions prior to 2.38.0, the system did stored the attachments uploaded by the students in their assignments as public files. This issue potentially exposed student-uploaded files to the public. Anyone with the file URL could access these files without authentication. The issue has been fixed in version 2.38.0 by ensuring all student-uploaded assignment attachments are stored as private files by default.

CVE-2025-11283 frappe vulnerability CVSS: 3.3 05 Oct 2025, 05:15 UTC

A vulnerability was determined in Frappe LMS 2.35.0. This affects an unknown function of the component Course Handler. Executing manipulation of the argument Description can lead to cross site scripting. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. It is suggested to upgrade the affected component. The vendor was informed early about a total of four security issues and confirmed that those have been fixed. However, the release notes on GitHub do not mention them.

CVE-2025-11282 frappe vulnerability CVSS: 3.3 05 Oct 2025, 05:15 UTC

A vulnerability was found in Frappe LMS 2.34.x/2.35.0. The impacted element is an unknown function of the component Incomplete Fix CVE-2025-55006. Performing manipulation results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The affected component should be upgraded. The vendor was informed early about a total of four security issues and confirmed that those have been fixed. However, the release notes on GitHub do not mention them.

CVE-2025-11281 frappe vulnerability CVSS: 4.6 05 Oct 2025, 04:15 UTC

A vulnerability has been found in Frappe LMS 2.35.0. The affected element is an unknown function of the file /courses/ of the component Unpublished Course Handler. Such manipulation leads to improper access controls. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is described as difficult. The exploit has been disclosed to the public and may be used. You should upgrade the affected component. The vendor was informed early about a total of four security issues and confirmed that those have been fixed. However, the release notes on GitHub do not mention them.

CVE-2025-11280 frappe vulnerability CVSS: 2.6 05 Oct 2025, 04:15 UTC

A flaw has been found in Frappe LMS 2.35.0. Impacted is an unknown function of the file /files/ of the component Assignment Picture Handler. This manipulation causes direct request. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitability is considered difficult. The exploit has been published and may be used. It is advisable to upgrade the affected component. The vendor was informed early about a total of four security issues and confirmed that those have been fixed. However, the release notes on GitHub do not mention them.

CVE-2025-56381 frappe vulnerability CVSS: 0 02 Oct 2025, 14:15 UTC

ERPNEXT v15.67.0 was discovered to contain multiple SQL injection vulnerabilities in the /api/method/frappe.desk.reportview.get endpoint via the order_by and group_by parameters.

CVE-2025-56380 frappe vulnerability CVSS: 0 02 Oct 2025, 14:15 UTC

Frappe Framework v15.72.4 was discovered to contain a SQL injection vulnerability via the fieldname parameter in the frappe.client.get_value API endpoint and a crafted script to the fieldname parameter

CVE-2025-56379 frappe vulnerability CVSS: 0 02 Oct 2025, 14:15 UTC

A stored cross-site scripting (XSS) vulnerability in the blog post feature of ERPNEXT v15.67.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the content field.

CVE-2025-52042 frappe vulnerability CVSS: 0 01 Oct 2025, 15:15 UTC

In Frappe ERPNext 15.57.5, the function get_rfq_containing_supplier() at erpnext/buying/doctype/request_for_quotation/request_for_quotation.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting SQL query via the txt parameter.

CVE-2025-52041 frappe vulnerability CVSS: 0 01 Oct 2025, 15:15 UTC

In Frappe ERPNext 15.57.5, the function get_stock_balance_for() at erpnext/stock/doctype/stock_reconciliation/stock_reconciliation.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting a SQL query into the inventory_dimensions_dict parameter.

CVE-2025-52040 frappe vulnerability CVSS: 0 01 Oct 2025, 15:15 UTC

In Frappe ERPNext 15.57.5, the function get_blanket_orders() at erpnext/controllers/queries.py is vulnerable to SQL Injection, which allows an attacker can extract all information from databases by injecting a SQL query into the blanket_order_type parameter.

CVE-2025-52039 frappe vulnerability CVSS: 0 01 Oct 2025, 15:15 UTC

In Frappe ERPNext 15.57.5, the function get_material_requests_based_on_supplier() at erpnext/stock/doctype/material_request/material_request.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting a SQL query into the txt parameter.

CVE-2025-52050 frappe vulnerability CVSS: 0 30 Sep 2025, 14:15 UTC

In Frappe ERPNext 15.57.5, the function get_loyalty_program_details_with_points() at erpnext/accounts/doctype/loyalty_program/loyalty_program.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting a SQL query into the expiry_date parameter.

CVE-2025-52049 frappe vulnerability CVSS: 0 30 Sep 2025, 14:15 UTC

In Frappe ErpNext v15.57.5, the function get_timesheet_detail_rate() at erpnext/projects/doctype/timesheet/timesheet.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting SQL query into the timelog parameter.

CVE-2025-52047 frappe vulnerability CVSS: 0 30 Sep 2025, 14:15 UTC

In Frappe ErpNext v15.57.5, the function get_income_account() at erpnext/controllers/queries.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting a SQL query into the filters.disabled parameter.

CVE-2025-52043 frappe vulnerability CVSS: 0 30 Sep 2025, 14:15 UTC

In Frappe ERPNext v15.57.5, the function import_coa() at erpnext/accounts/doctype/chart_of_accounts_importer/chart_of_accounts_importer.py is vulnerable to SQL injection, which allows an attacker to extract all information from databases by injecting a SQL query into the company parameter.

CVE-2025-59415 frappe vulnerability CVSS: 0 17 Sep 2025, 21:15 UTC

Frappe Learning is a learning system that helps users structure their content. In versions 2.34.1 and below, there is a security vulnerability in Frappe Learning where the system did not adequately sanitize the content uploaded in the profile bio. Malicious SVG files could be used to execute arbitrary scripts in the context of other users.

CVE-2025-52044 frappe vulnerability CVSS: 0 16 Sep 2025, 14:15 UTC

In Frappe ERPNext v15.57.5, the function get_stock_balance() at erpnext/stock/utils.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting SQL query into inventory_dimensions_dict parameter.

CVE-2025-52048 frappe vulnerability CVSS: 0 15 Sep 2025, 16:15 UTC

In Frappe 15.x.x before 15.72.0 and 14.x.x before 14.96.10, in the function add_tag() at `frappe/desk/doctype/tag/tag.py` is vulnerable to SQL Injection, which allows an attacker to extract information from databases by injecting a SQL query into the `dt` parameter.

CVE-2025-58439 frappe vulnerability CVSS: 0 06 Sep 2025, 01:15 UTC

ERP is a free and open source Enterprise Resource Planning tool. In versions below 14.89.2 and 15.0.0 through 15.75.1, lack of validation of parameters left certain endpoints vulnerable to error-based SQL Injection. Some information like version could be retrieved. This issue is fixed in versions 14.89.2 and 15.76.0.

CVE-2025-55732 frappe vulnerability CVSS: 0 20 Aug 2025, 16:15 UTC

Frappe is a full-stack web application framework. Prior to 15.74.2 and 14.96.15, an attacker could implement SQL injection through specially crafted requests, allowing malicious people to access sensitive information. This vulnerability is a bypass of the official patch released for CVE-2025-52895. This vulnerability is fixed in 15.74.2 and 14.96.15.

CVE-2025-55731 frappe vulnerability CVSS: 0 20 Aug 2025, 16:15 UTC

Frappe is a full-stack web application framework. A carefully crafted request could extract data that the user would normally not have access to, via SQL injection. This vulnerability is fixed in 15.74.2 and 14.96.15.

CVE-2025-55006 frappe vulnerability CVSS: 0 09 Aug 2025, 03:15 UTC

Frappe Learning is a learning system that helps users structure their content. In versions 2.33.0 and below, the image upload functionality did not adequately sanitize uploaded SVG files. This allowed users to upload SVG files containing embedded JavaScript or other potentially malicious content. Malicious SVG files could be used to execute arbitrary scripts in the context of other users. A fix for this issue is planned for version 2.34.0.

CVE-2025-52898 frappe vulnerability CVSS: 0 30 Jun 2025, 18:15 UTC

Frappe is a full-stack web application framework. Prior to versions 14.94.3 and 15.58.0, a carefully crafted request could lead to a malicious actor getting access to a user's password reset token. This can only be exploited on self hosted instances configured in a certain way. Frappe Cloud users are safe. This issue has been patched in versions 14.94.3 and 15.58.0. Workarounds for this issue involve verifying password reset URLs before clicking on them or upgrading for self hosted users.

CVE-2025-52896 frappe vulnerability CVSS: 0 30 Jun 2025, 17:15 UTC

Frappe is a full-stack web application framework. Prior to versions 14.94.2 and 15.57.0, authenticated users could upload carefully crafted malicious files via Data Import, leading to cross-site scripting (XSS). This issue has been patched in versions 14.94.2 and 15.57.0. There are no workarounds for this issue other than upgrading.

CVE-2025-52895 frappe vulnerability CVSS: 0 30 Jun 2025, 17:15 UTC

Frappe is a full-stack web application framework. Prior to versions 14.94.3 and 15.58.0, SQL injection could be achieved via a specially crafted request, which could allow malicious person to gain access to sensitive information. This issue has been patched in versions 14.94.3 and 15.58.0. There are no workarounds for this issue other than upgrading.

CVE-2025-28062 frappe vulnerability CVSS: 0 05 May 2025, 16:15 UTC

A Cross-Site Request Forgery (CSRF) vulnerability was discovered in ERPNEXT 14.82.1 and 14.74.3. The vulnerability allows an attacker to perform unauthorized actions such as user deletion, password resets, and privilege escalation due to missing CSRF protections.

CVE-2025-30217 frappe vulnerability CVSS: 0 26 Mar 2025, 17:15 UTC

Frappe is a full-stack web application framework. Prior to versions 14.93.2 and 15.55.0, a SQL Injection vulnerability has been identified in Frappe Framework which could allow a malicious actor to access sensitive information. Versions 14.93.2 and 15.55.0 contain a patch for the issue. No known workarounds are available.

CVE-2025-30214 frappe vulnerability CVSS: 0 25 Mar 2025, 15:15 UTC

Frappe is a full-stack web application framework. Prior to versions 14.89.0 and 15.51.0, making crafted requests could lead to information disclosure that could further lead to account takeover. Versions 14.89.0 and 15.51.0 fix the issue. There's no workaround to fix this without upgrading.

CVE-2025-30213 frappe vulnerability CVSS: 0 25 Mar 2025, 15:15 UTC

Frappe is a full-stack web application framework. Prior to versions 14.91.0 and 15.52.0, a system user was able to create certain documents in a specific way that could lead to remote code execution. Versions 14.9.1 and 15.52.0 contain a patch for the vulnerability. There's no workaround; an upgrade is required.

CVE-2025-30212 frappe vulnerability CVSS: 0 25 Mar 2025, 15:15 UTC

Frappe is a full-stack web application framework. An SQL Injection vulnerability has been identified in Frappe Framework prior to versions 14.89.0 and 15.51.0 which could allow a malicious actor to access sensitive information. Versions 14.89.0 and 15.51.0 fix the issue. Upgrading is required; no other workaround is present.

CVE-2024-34074 frappe vulnerability CVSS: 0 14 May 2024, 15:38 UTC

Frappe is a full-stack web application framework. Prior to 15.26.0 and 14.74.0, the login page accepts redirect argument and it allowed redirect to untrusted external URls. This behaviour can be used by malicious actors for phishing. This vulnerability is fixed in 15.26.0 and 14.74.0.

CVE-2024-27105 frappe vulnerability CVSS: 0 21 Mar 2024, 02:52 UTC

Frappe is a full-stack web application framework. Prior to versions 14.66.3 and 15.16.0, file permission can be bypassed using certain endpoints, granting less privileged users permission to delete or clone a file. Versions 14.66.3 and 15.16.0 contain a patch for this issue. No known workarounds are available.

CVE-2024-24813 frappe vulnerability CVSS: 0 21 Mar 2024, 02:52 UTC

Frappe is a full-stack web application framework. Prior to versions 14.64.0 and 15.0.0, SQL injection from a particular whitelisted method can result in access to data which the user doesn't have permission to access. Versions 14.64.0 and 15.0.0 contain a patch for this issue. No known workarounds are available.

CVE-2024-24812 frappe vulnerability CVSS: 0 07 Feb 2024, 15:15 UTC

Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and a tightly integrated client side library. Prior to versions 14.59.0 and 15.5.0, portal pages are susceptible to Cross-Site Scripting (XSS) which can be used to inject malicious JS code if user clicks on a malicious link. This vulnerability has been patched in versions 14.59.0 and 15.5.0. No known workarounds are available.

CVE-2023-46127 frappe vulnerability CVSS: 0 23 Oct 2023, 15:15 UTC

Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and an integrated client side library. A malicious Frappe user with desk access could create documents containing HTML payloads allowing HTML Injection. This vulnerability has been patched in version 14.49.0.

CVE-2023-5555 frappe vulnerability CVSS: 0 12 Oct 2023, 11:15 UTC

Cross-site Scripting (XSS) - Generic in GitHub repository frappe/lms prior to 5614a6203fb7d438be8e2b1e3030e4528d170ec4.

CVE-2023-42807 frappe vulnerability CVSS: 0 21 Sep 2023, 17:15 UTC

Frappe LMS is an open source learning management system. In versions 1.0.0 and prior, on the People Page of LMS, there was an SQL Injection vulnerability. The issue has been fixed in the `main` branch. Users won't face this issue if they are using the latest main branch of the app.

CVE-2023-41328 frappe vulnerability CVSS: 0 06 Sep 2023, 18:15 UTC

Frappe is a low code web framework written in Python and Javascript. A SQL Injection vulnerability has been identified in the Frappe Framework which could allow a malicious actor to access sensitive information. This issue has been addressed in versions 13.46.1 and 14.20.0. Users are advised to upgrade. There's no workaround to fix this without upgrading.

CVE-2022-41712 frappe vulnerability CVSS: 0 25 Nov 2022, 18:15 UTC

Frappe version 14.10.0 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not correctly validate the information injected by the user in the import_file parameter.

CVE-2022-3988 frappe vulnerability CVSS: 0 14 Nov 2022, 11:15 UTC

A vulnerability was found in Frappe. It has been rated as problematic. Affected by this issue is some unknown functionality of the file frappe/templates/includes/navbar/navbar_search.html of the component Search. The manipulation of the argument q leads to cross site scripting. The attack may be launched remotely. The name of the patch is bfab7191543961c6cb77fe267063877c31b616ce. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213560.

CVE-2022-28598 frappe vulnerability CVSS: 0 22 Aug 2022, 17:15 UTC

Frappe ERPNext 12.29.0 is vulnerable to XSS where the software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users.

CVE-2022-23055 frappe vulnerability CVSS: 5.5 22 Jun 2022, 09:15 UTC

In ERPNext, versions v11.0.0-beta through v13.0.2 are vulnerable to Missing Authorization, in the chat rooms functionality. A low privileged attacker can send a direct message or a group message to any member or group, impersonating themselves as the administrator. The attacker can also read chat messages of groups that they do not belong to, and of other users.

CVE-2022-23058 frappe vulnerability CVSS: 3.5 22 Jun 2022, 08:15 UTC

ERPNext in versions v12.0.9-v13.0.3 are affected by a stored XSS vulnerability that allows low privileged users to store malicious scripts in the ‘username’ field in ‘my settings’ which can lead to full account takeover.

CVE-2022-23057 frappe vulnerability CVSS: 3.5 22 Jun 2022, 08:15 UTC

In ERPNext, versions v12.0.9--v13.0.3 are vulnerable to Stored Cross-Site-Scripting (XSS), due to user input not being validated properly. A low privileged attacker could inject arbitrary code into input fields when editing his profile.

CVE-2022-23056 frappe vulnerability CVSS: 3.5 22 Jun 2022, 08:15 UTC

In ERPNext, versions v13.0.0-beta.13 through v13.30.0 are vulnerable to Stored XSS at the Patient History page which allows a low privilege user to conduct an account takeover attack.

CVE-2020-35175 frappe vulnerability CVSS: 5.0 11 Dec 2020, 23:15 UTC

Frappe Framework 12 and 13 does not properly validate the HTTP method for the frappe.client API.

CVE-2020-27508 frappe vulnerability CVSS: 5.0 11 Dec 2020, 16:15 UTC

In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security.

CVE-2020-6145 frappe vulnerability CVSS: 6.5 10 Aug 2020, 14:15 UTC

An SQL injection vulnerability exists in the frappe.desk.reportview.get functionality of ERPNext 11.1.38. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.

CVE-2019-20521 frappe vulnerability CVSS: 4.3 19 Mar 2020, 18:15 UTC

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the api/ URI.

CVE-2019-20520 frappe vulnerability CVSS: 4.3 19 Mar 2020, 18:15 UTC

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the api/method/ URI.

CVE-2019-20519 frappe vulnerability CVSS: 4.3 19 Mar 2020, 18:15 UTC

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the user/ URI, as demonstrated by a crafted e-mail address.

CVE-2019-20518 frappe vulnerability CVSS: 4.3 19 Mar 2020, 18:15 UTC

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the project/ URI.

CVE-2019-20517 frappe vulnerability CVSS: 4.3 19 Mar 2020, 18:15 UTC

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the contact/ URI.

CVE-2019-20516 frappe vulnerability CVSS: 4.3 19 Mar 2020, 18:15 UTC

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the blog/ URI.

CVE-2019-20515 frappe vulnerability CVSS: 4.3 19 Mar 2020, 18:15 UTC

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the addresses/ URI.

CVE-2019-20514 frappe vulnerability CVSS: 4.3 19 Mar 2020, 18:15 UTC

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the address/ URI.

CVE-2019-20529 frappe vulnerability CVSS: 5.0 18 Mar 2020, 19:15 UTC

In core/doctype/prepared_report/prepared_report.py in Frappe 11 and 12, data files generated with Prepared Report were being stored as public files (no authentication is required to access; having a link is sufficient) instead of private files.

CVE-2019-20511 frappe vulnerability CVSS: 4.3 18 Mar 2020, 19:15 UTC

ERPNext 11.1.47 allows blog?blog_category= Frame Injection.

CVE-2019-15700 frappe vulnerability CVSS: 4.3 27 Aug 2019, 18:15 UTC

public/js/frappe/form/footer/timeline.js in Frappe Framework 12 through 12.0.8 does not escape HTML in the timeline and thus is affected by crafted "changed value of" text.

CVE-2019-14967 frappe vulnerability CVSS: 4.3 12 Aug 2019, 18:15 UTC

An issue was discovered in Frappe Framework 10, 11 before 11.1.46, and 12. There exists an XSS vulnerability.

CVE-2019-14966 frappe vulnerability CVSS: 6.5 12 Aug 2019, 18:15 UTC

An issue was discovered in Frappe Framework 10 through 12 before 12.0.4. There exists an authenticated SQL injection.

CVE-2019-14965 frappe vulnerability CVSS: 7.5 12 Aug 2019, 18:15 UTC

An issue was discovered in Frappe Framework 10 through 12 before 12.0.4. A server side template injection (SSTI) issue exists.

CVE-2018-20061 frappe vulnerability CVSS: 5.0 11 Dec 2018, 17:29 UTC

A SQL injection issue was discovered in ERPNext 10.x and 11.x through 11.0.3-beta.29. This attack is only available to a logged-in user; however, many ERPNext sites allow account creation via the web. No special privileges are needed to conduct the attack. By calling a JavaScript function that calls a server-side Python function with carefully chosen arguments, a SQL attack can be carried out which allows SQL queries to be constructed to return any columns from any tables in the database. This is related to /api/resource/Item?fields= URIs, frappe.get_list, and frappe.call.

CVE-2018-11339 frappe vulnerability CVSS: 4.3 22 May 2018, 01:29 UTC

An XSS issue was discovered in Frappe ERPNext v11.x.x-develop b1036e5 via a comment.

CVE-2017-1000120 frappe vulnerability CVSS: 6.5 05 Oct 2017, 01:29 UTC

[ERPNext][Frappe Version <= 7.1.27] SQL injection vulnerability in frappe.share.get_users allows remote authenticated users to execute arbitrary SQL commands via the fields parameter.