CVE-2025-66205

Frappe · Frappe Multiple Products

A high-severity vulnerability has been discovered in multiple Frappe products, which could allow an attacker to gain unauthorized access to sensitive information and perform actions on behalf of privi.

Executive summary

A high-severity vulnerability has been discovered in multiple Frappe products, which could allow an attacker to gain unauthorized access to sensitive information and perform actions on behalf of privileged users. This flaw stems from improper handling of user-supplied data, enabling an attacker to inject and execute malicious code within the web browser of an administrator or other users. Successful exploitation could lead to data theft, account compromise, and unauthorized control over critical business applications.

Vulnerability

The vulnerability is a stored Cross-Site Scripting (XSS) flaw. It exists due to insufficient input sanitization in a data-entry field accessible to authenticated users. An attacker can inject a malicious script (payload) into this field, which is then stored in the application's database. When a high-privilege user, such as an administrator, views the page containing the malicious payload, the script executes within their browser context, potentially allowing the attacker to hijack their session, steal credentials, or perform administrative actions without their knowledge.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.1. Exploitation could have a significant negative impact on the business by compromising the confidentiality, integrity, and availability of data within Frappe-based applications like ERPNext. An attacker could leverage this flaw to steal sensitive customer data, financial records, or proprietary business information. Furthermore, compromising an administrative account could allow an attacker to disrupt business operations, manipulate data, or pivot to other systems within the network, leading to potential financial loss, reputational damage, and regulatory non-compliance.

Remediation

Immediate Action: Apply vendor security updates immediately. All system administrators should prioritize the deployment of the security patches released by Frappe to all affected instances. After patching, it is critical to monitor for any ongoing exploitation attempts and review historical access and application logs for indicators of compromise that may have occurred prior to the patch.

Proactive Monitoring: Security teams should actively monitor application logs for suspicious input containing HTML or script tags (e.g., <script>, onerror, <img>, <a>) in user-submitted fields. Monitor for unusual administrative activity, such as unexpected user creation, permission changes, or data exports, especially from unfamiliar IP addresses. Network monitoring can also help detect connections to known malicious domains that may be part of an XSS payload.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rulesets designed to detect and block common XSS attack patterns. Enforce a strict Content Security Policy (CSP) on the web server to limit the sources from which scripts can be executed, thereby mitigating the impact of a successful injection. Additionally, enforce the principle of least privilege, ensuring users only have the permissions necessary for their roles.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high-severity CVSS score of 7.1 and the potential for complete administrative account takeover, we strongly recommend that organizations apply the vendor-supplied patches to all vulnerable Frappe instances with the highest priority. Although this vulnerability is not yet on the CISA KEV list, the risk of data breach and operational disruption is significant. Proactive patching is the most effective defense and should be completed immediately to prevent potential exploitation.