Vulnerabilities (CVE)

Filtered by vendor Frappe Subscribe
Filtered by product Frappe
Total 13 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-24812 1 Frappe 1 Frappe 2024-02-14 N/A 5.4 MEDIUM
Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and a tightly integrated client side library. Prior to versions 14.59.0 and 15.5.0, portal pages are susceptible to Cross-Site Scripting (XSS) which can be used to inject malicious JS code if user clicks on a malicious link. This vulnerability has been patched in versions 14.59.0 and 15.5.0. No known workarounds are available.
CVE-2023-46127 1 Frappe 1 Frappe 2023-12-10 N/A 5.4 MEDIUM
Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and an integrated client side library. A malicious Frappe user with desk access could create documents containing HTML payloads allowing HTML Injection. This vulnerability has been patched in version 14.49.0.
CVE-2023-41328 1 Frappe 1 Frappe 2023-12-10 N/A 7.5 HIGH
Frappe is a low code web framework written in Python and Javascript. A SQL Injection vulnerability has been identified in the Frappe Framework which could allow a malicious actor to access sensitive information. This issue has been addressed in versions 13.46.1 and 14.20.0. Users are advised to upgrade. There's no workaround to fix this without upgrading.
CVE-2022-41712 1 Frappe 1 Frappe 2023-12-10 N/A 6.5 MEDIUM
Frappe version 14.10.0 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not correctly validate the information injected by the user in the import_file parameter.
CVE-2022-3988 1 Frappe 1 Frappe 2023-12-10 N/A 6.1 MEDIUM
A vulnerability was found in Frappe. It has been rated as problematic. Affected by this issue is some unknown functionality of the file frappe/templates/includes/navbar/navbar_search.html of the component Search. The manipulation of the argument q leads to cross site scripting. The attack may be launched remotely. The name of the patch is bfab7191543961c6cb77fe267063877c31b616ce. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213560.
CVE-2020-35175 1 Frappe 1 Frappe 2023-12-10 5.0 MEDIUM 5.3 MEDIUM
Frappe Framework 12 and 13 does not properly validate the HTTP method for the frappe.client API.
CVE-2020-27508 1 Frappe 1 Frappe 2023-12-10 5.0 MEDIUM 7.5 HIGH
In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security.
CVE-2019-20529 1 Frappe 1 Frappe 2023-12-10 5.0 MEDIUM 7.5 HIGH
In core/doctype/prepared_report/prepared_report.py in Frappe 11 and 12, data files generated with Prepared Report were being stored as public files (no authentication is required to access; having a link is sufficient) instead of private files.
CVE-2019-14965 1 Frappe 1 Frappe 2023-12-10 7.5 HIGH 9.8 CRITICAL
An issue was discovered in Frappe Framework 10 through 12 before 12.0.4. A server side template injection (SSTI) issue exists.
CVE-2019-14967 1 Frappe 1 Frappe 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in Frappe Framework 10, 11 before 11.1.46, and 12. There exists an XSS vulnerability.
CVE-2019-14966 1 Frappe 1 Frappe 2023-12-10 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Frappe Framework 10 through 12 before 12.0.4. There exists an authenticated SQL injection.
CVE-2019-15700 1 Frappe 1 Frappe 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
public/js/frappe/form/footer/timeline.js in Frappe Framework 12 through 12.0.8 does not escape HTML in the timeline and thus is affected by crafted "changed value of" text.
CVE-2017-1000120 1 Frappe 1 Frappe 2023-12-10 6.5 MEDIUM 8.8 HIGH
[ERPNext][Frappe Version <= 7.1.27] SQL injection vulnerability in frappe.share.get_users allows remote authenticated users to execute arbitrary SQL commands via the fields parameter.