Frappe

24 CVEs product

Monthly

CVE-2026-31879 MEDIUM This Month

Frappe is a full-stack web application framework. versions up to 14.100.2 is affected by cross-site scripting (xss).

XSS Frappe
NVD GitHub VulDB
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-31878 MEDIUM This Month

Frappe is a full-stack web application framework. versions up to 14.100.1 is affected by server-side request forgery (ssrf) (CVSS 5.0).

SSRF Frappe
NVD GitHub VulDB
CVSS 3.1
5.0
EPSS
0.0%
CVE-2026-31877 CRITICAL Act Now

SQL injection in Frappe framework before 15.84.0/14.99.0.

SQLi Frappe
NVD GitHub VulDB
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-29081 MEDIUM This Month

Frappe versions prior to 14.100.1 and 15.100.0 contain a SQL injection vulnerability in an endpoint that allows authenticated attackers to extract sensitive information from the database. An attacker with valid credentials can craft malicious requests to bypass query protections and access confidential data without modifying or disrupting system availability. No patch is currently available for affected deployments.

SQLi Frappe
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-29077 HIGH This Week

Frappe versions prior to 15.98.0 and 14.100.0 contain an improper access control vulnerability that allows authenticated users to grant document permissions they do not possess to other users. An attacker with valid credentials could escalate privileges by sharing documents with elevated permissions, potentially exposing sensitive information or enabling unauthorized modifications. No patch is currently available.

Authentication Bypass Frappe
NVD GitHub
CVSS 3.1
7.1
EPSS
0.1%
CVE-2026-28436 HIGH This Week

Stored cross-site scripting in Frappe versions prior to 16.11.0 and 15.102.0 allows unauthenticated attackers to execute arbitrary JavaScript in users' browsers through malicious image URLs in avatar fields and website comments. The vulnerability affects any user viewing a page containing the compromised avatar, enabling session hijacking, credential theft, or malware distribution without user interaction.

XSS Frappe
NVD GitHub
CVSS 3.1
7.2
EPSS
0.0%
CVE-2026-25956 MEDIUM PATCH This Month

Malicious signup URLs in Frappe versions prior to 14.99.14 and 15.94.0 can redirect users to attacker-controlled sites or execute reflected XSS payloads during the registration process. An attacker can craft a crafted signup link to trick users into visiting malicious destinations or having malicious scripts executed in their browsers. A patch is available in the fixed versions.

Open Redirect Frappe
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2025-68953 HIGH PATCH This Week

Frappe is a full-stack web application framework. Versions 14.99.5 and below and 15.0.0 through 15.80.1 include requests that are vulnerable to path traversal attacks. [CVSS 7.5 HIGH]

Path Traversal Frappe
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-65267 CRITICAL Act Now

In ERPNext v15.83.2 and Frappe Framework v15.86.0, improper validation of uploaded SVG avatar images allows attackers to embed malicious JavaScript. The payload executes when an administrator clicks the image link to view the avatar, resulting in stored cross-site scripting (XSS). Successful exploitation may lead to account takeover, privilege escalation, or full compromise of the affected ERPNext instance.

Privilege Escalation XSS Erpnext Frappe
NVD GitHub
CVSS 3.1
9.0
EPSS
0.1%
CVE-2025-66206 MEDIUM This Month

Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, certain requests were vulnerable to path traversal attacks, wherein some files from the server could be retrieved if the full path was known. Sites hosted on Frappe Cloud, and even other setups that are behind a reverse proxy like NGINX are unaffected. This would mainly affect someone directly using werkzeug/gunicorn. In those cases, either an upgrade or changing the setup to use a reverse proxy is recommended. This vulnerability is fixed in 15.86.0 and 14.99.2.

Nginx Path Traversal Frappe
NVD GitHub
CVSS 3.1
6.8
EPSS
0.1%
CVE-2025-66205 HIGH PATCH This Week

Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, a certain endpoint was vulnerable to error-based SQL injection due to lack of validation of parameters. Some information like version could be retrieved. This vulnerability is fixed in 15.86.0 and 14.99.2.

SQLi Frappe
NVD GitHub
CVSS 3.1
7.1
EPSS
0.0%
CVE-2025-56381 MEDIUM POC This Month

ERPNEXT v15.67.0 was discovered to contain multiple SQL injection vulnerabilities in the /api/method/frappe.desk.reportview.get endpoint via the order_by and group_by parameters.

SQLi Erpnext Frappe
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-56380 MEDIUM POC This Month

Frappe Framework v15.72.4 was discovered to contain a SQL injection vulnerability via the fieldname parameter in the frappe.client.get_value API endpoint and a crafted script to the fieldname parameter

SQLi Erpnext Frappe
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-56379 MEDIUM POC This Month

A stored cross-site scripting (XSS) vulnerability in the blog post feature of ERPNEXT v15.67.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the content field.

XSS Frappe Erpnext
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-52048 MEDIUM POC This Month

In Frappe 15.x.x before 15.72.0 and 14.x.x before 14.96.10, in the function add_tag() at `frappe/desk/doctype/tag/tag.py` is vulnerable to SQL Injection, which allows an attacker to extract. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

SQLi Frappe
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-55732 HIGH PATCH This Month

Frappe is a full-stack web application framework. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. This SQL Injection vulnerability could allow attackers to execute arbitrary SQL commands against the database.

SQLi Frappe
NVD GitHub
CVSS 4.0
8.7
EPSS
0.0%
CVE-2025-55731 MEDIUM PATCH This Month

Frappe is a full-stack web application framework. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, low attack complexity. This SQL Injection vulnerability could allow attackers to execute arbitrary SQL commands against the database.

SQLi Frappe
NVD GitHub
CVSS 4.0
6.3
EPSS
0.0%
CVE-2025-52898 HIGH PATCH This Week

Frappe is a full-stack web application framework. Prior to versions 14.94.3 and 15.58.0, a carefully crafted request could lead to a malicious actor getting access to a user's password reset token. This can only be exploited on self hosted instances configured in a certain way. Frappe Cloud users are safe. This issue has been patched in versions 14.94.3 and 15.58.0. Workarounds for this issue involve verifying password reset URLs before clicking on them or upgrading for self hosted users.

Information Disclosure Frappe
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-52896 MEDIUM PATCH This Month

Frappe is a full-stack web application framework. Prior to versions 14.94.2 and 15.57.0, authenticated users could upload carefully crafted malicious files via Data Import, leading to cross-site scripting (XSS). This issue has been patched in versions 14.94.2 and 15.57.0. There are no workarounds for this issue other than upgrading.

XSS Frappe
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-52895 HIGH PATCH This Week

Frappe is a full-stack web application framework. Prior to versions 14.94.3 and 15.58.0, SQL injection could be achieved via a specially crafted request, which could allow malicious person to gain access to sensitive information. This issue has been patched in versions 14.94.3 and 15.58.0. There are no workarounds for this issue other than upgrading.

SQLi Frappe
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-30217 MEDIUM PATCH This Month

Frappe is a full-stack web application framework. Rated medium severity (CVSS 6.6), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

SQLi Frappe
NVD GitHub
CVSS 4.0
6.6
EPSS
0.1%
CVE-2025-30214 HIGH PATCH This Week

Frappe is a full-stack web application framework. Rated high severity (CVSS 8.0), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Frappe
NVD GitHub
CVSS 4.0
8.0
EPSS
0.1%
CVE-2025-30213 MEDIUM PATCH This Month

Frappe is a full-stack web application framework. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

RCE Frappe
NVD GitHub
CVSS 4.0
6.3
EPSS
0.7%
CVE-2025-30212 MEDIUM PATCH This Month

Frappe is a full-stack web application framework. Rated medium severity (CVSS 6.6), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This SQL Injection vulnerability could allow attackers to execute arbitrary SQL commands against the database.

SQLi Frappe
NVD GitHub
CVSS 4.0
6.6
EPSS
0.1%
CVE-2026-31879
EPSS 0% CVSS 5.4
MEDIUM This Month

Frappe is a full-stack web application framework. versions up to 14.100.2 is affected by cross-site scripting (xss).

XSS Frappe
NVD GitHub VulDB
CVE-2026-31878
EPSS 0% CVSS 5.0
MEDIUM This Month

Frappe is a full-stack web application framework. versions up to 14.100.1 is affected by server-side request forgery (ssrf) (CVSS 5.0).

SSRF Frappe
NVD GitHub VulDB
CVE-2026-31877
EPSS 0% CVSS 9.8
CRITICAL Act Now

SQL injection in Frappe framework before 15.84.0/14.99.0.

SQLi Frappe
NVD GitHub VulDB
CVE-2026-29081
EPSS 0% CVSS 6.5
MEDIUM This Month

Frappe versions prior to 14.100.1 and 15.100.0 contain a SQL injection vulnerability in an endpoint that allows authenticated attackers to extract sensitive information from the database. An attacker with valid credentials can craft malicious requests to bypass query protections and access confidential data without modifying or disrupting system availability. No patch is currently available for affected deployments.

SQLi Frappe
NVD GitHub
CVE-2026-29077
EPSS 0% CVSS 7.1
HIGH This Week

Frappe versions prior to 15.98.0 and 14.100.0 contain an improper access control vulnerability that allows authenticated users to grant document permissions they do not possess to other users. An attacker with valid credentials could escalate privileges by sharing documents with elevated permissions, potentially exposing sensitive information or enabling unauthorized modifications. No patch is currently available.

Authentication Bypass Frappe
NVD GitHub
CVE-2026-28436
EPSS 0% CVSS 7.2
HIGH This Week

Stored cross-site scripting in Frappe versions prior to 16.11.0 and 15.102.0 allows unauthenticated attackers to execute arbitrary JavaScript in users' browsers through malicious image URLs in avatar fields and website comments. The vulnerability affects any user viewing a page containing the compromised avatar, enabling session hijacking, credential theft, or malware distribution without user interaction.

XSS Frappe
NVD GitHub
CVE-2026-25956
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

Malicious signup URLs in Frappe versions prior to 14.99.14 and 15.94.0 can redirect users to attacker-controlled sites or execute reflected XSS payloads during the registration process. An attacker can craft a crafted signup link to trick users into visiting malicious destinations or having malicious scripts executed in their browsers. A patch is available in the fixed versions.

Open Redirect Frappe
NVD GitHub
CVE-2025-68953
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Frappe is a full-stack web application framework. Versions 14.99.5 and below and 15.0.0 through 15.80.1 include requests that are vulnerable to path traversal attacks. [CVSS 7.5 HIGH]

Path Traversal Frappe
NVD GitHub
CVE-2025-65267
EPSS 0% CVSS 9.0
CRITICAL Act Now

In ERPNext v15.83.2 and Frappe Framework v15.86.0, improper validation of uploaded SVG avatar images allows attackers to embed malicious JavaScript. The payload executes when an administrator clicks the image link to view the avatar, resulting in stored cross-site scripting (XSS). Successful exploitation may lead to account takeover, privilege escalation, or full compromise of the affected ERPNext instance.

Privilege Escalation XSS Erpnext +1
NVD GitHub
CVE-2025-66206
EPSS 0% CVSS 6.8
MEDIUM This Month

Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, certain requests were vulnerable to path traversal attacks, wherein some files from the server could be retrieved if the full path was known. Sites hosted on Frappe Cloud, and even other setups that are behind a reverse proxy like NGINX are unaffected. This would mainly affect someone directly using werkzeug/gunicorn. In those cases, either an upgrade or changing the setup to use a reverse proxy is recommended. This vulnerability is fixed in 15.86.0 and 14.99.2.

Nginx Path Traversal Frappe
NVD GitHub
CVE-2025-66205
EPSS 0% CVSS 7.1
HIGH PATCH This Week

Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, a certain endpoint was vulnerable to error-based SQL injection due to lack of validation of parameters. Some information like version could be retrieved. This vulnerability is fixed in 15.86.0 and 14.99.2.

SQLi Frappe
NVD GitHub
CVE-2025-56381
EPSS 0% CVSS 6.5
MEDIUM POC This Month

ERPNEXT v15.67.0 was discovered to contain multiple SQL injection vulnerabilities in the /api/method/frappe.desk.reportview.get endpoint via the order_by and group_by parameters.

SQLi Erpnext Frappe
NVD GitHub
CVE-2025-56380
EPSS 0% CVSS 6.5
MEDIUM POC This Month

Frappe Framework v15.72.4 was discovered to contain a SQL injection vulnerability via the fieldname parameter in the frappe.client.get_value API endpoint and a crafted script to the fieldname parameter

SQLi Erpnext Frappe
NVD GitHub
CVE-2025-56379
EPSS 0% CVSS 5.4
MEDIUM POC This Month

A stored cross-site scripting (XSS) vulnerability in the blog post feature of ERPNEXT v15.67.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the content field.

XSS Frappe Erpnext
NVD GitHub
CVE-2025-52048
EPSS 0% CVSS 6.5
MEDIUM POC This Month

In Frappe 15.x.x before 15.72.0 and 14.x.x before 14.96.10, in the function add_tag() at `frappe/desk/doctype/tag/tag.py` is vulnerable to SQL Injection, which allows an attacker to extract. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

SQLi Frappe
NVD GitHub
CVE-2025-55732
EPSS 0% CVSS 8.7
HIGH PATCH This Month

Frappe is a full-stack web application framework. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. This SQL Injection vulnerability could allow attackers to execute arbitrary SQL commands against the database.

SQLi Frappe
NVD GitHub
CVE-2025-55731
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

Frappe is a full-stack web application framework. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, low attack complexity. This SQL Injection vulnerability could allow attackers to execute arbitrary SQL commands against the database.

SQLi Frappe
NVD GitHub
CVE-2025-52898
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Frappe is a full-stack web application framework. Prior to versions 14.94.3 and 15.58.0, a carefully crafted request could lead to a malicious actor getting access to a user's password reset token. This can only be exploited on self hosted instances configured in a certain way. Frappe Cloud users are safe. This issue has been patched in versions 14.94.3 and 15.58.0. Workarounds for this issue involve verifying password reset URLs before clicking on them or upgrading for self hosted users.

Information Disclosure Frappe
NVD GitHub
CVE-2025-52896
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Frappe is a full-stack web application framework. Prior to versions 14.94.2 and 15.57.0, authenticated users could upload carefully crafted malicious files via Data Import, leading to cross-site scripting (XSS). This issue has been patched in versions 14.94.2 and 15.57.0. There are no workarounds for this issue other than upgrading.

XSS Frappe
NVD GitHub
CVE-2025-52895
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Frappe is a full-stack web application framework. Prior to versions 14.94.3 and 15.58.0, SQL injection could be achieved via a specially crafted request, which could allow malicious person to gain access to sensitive information. This issue has been patched in versions 14.94.3 and 15.58.0. There are no workarounds for this issue other than upgrading.

SQLi Frappe
NVD GitHub
CVE-2025-30217
EPSS 0% CVSS 6.6
MEDIUM PATCH This Month

Frappe is a full-stack web application framework. Rated medium severity (CVSS 6.6), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

SQLi Frappe
NVD GitHub
CVE-2025-30214
EPSS 0% CVSS 8.0
HIGH PATCH This Week

Frappe is a full-stack web application framework. Rated high severity (CVSS 8.0), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Frappe
NVD GitHub
CVE-2025-30213
EPSS 1% CVSS 6.3
MEDIUM PATCH This Month

Frappe is a full-stack web application framework. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

RCE Frappe
NVD GitHub
CVE-2025-30212
EPSS 0% CVSS 6.6
MEDIUM PATCH This Month

Frappe is a full-stack web application framework. Rated medium severity (CVSS 6.6), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This SQL Injection vulnerability could allow attackers to execute arbitrary SQL commands against the database.

SQLi Frappe
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy