CVE-2025-67289
Frappe · Frappe Framework and multiple products built upon it.
A critical vulnerability has been identified in the Frappe Framework, a widely used platform for developing web applications like ERPNext.
Executive summary
A critical vulnerability has been identified in the Frappe Framework, a widely used platform for developing web applications like ERPNext. This flaw allows an unauthenticated attacker to upload a malicious file, which can lead to complete system compromise. Successful exploitation could result in the execution of arbitrary code, enabling attackers to steal sensitive data, disrupt operations, and gain full control of the affected server.
Vulnerability
The vulnerability is an arbitrary file upload flaw within the Attachments module. The application fails to properly validate files uploaded by users, specifically crafted XML files. An attacker can create a malicious XML file containing executable code (e.g., a web shell) and upload it through the attachment functionality. Because the server-side validation is insufficient, the file is saved to a location on the server that can be accessed from the web, allowing the attacker to trigger the embedded code and achieve remote code execution (RCE) with the privileges of the web server process.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.6, posing a significant and immediate threat to the organization. Successful exploitation could lead to a complete compromise of the application server, resulting in severe consequences such as the theft of sensitive business data, customer information, and financial records. An attacker could disrupt business operations by defacing the application, deleting data, or using the compromised server as a pivot point to attack other systems within the internal network, leading to significant financial loss and reputational damage.
Remediation
Immediate Action: Update the Frappe Framework and any affected products to the latest version as recommended by the vendor. After patching, it is crucial to monitor for any signs of post-exploitation activity and thoroughly review web server and application access logs for indicators of compromise that may have occurred before the patch was applied.
Proactive Monitoring: Security teams should actively monitor for exploitation attempts. This includes inspecting web server logs for unusual file uploads, particularly XML files or files with unexpected extensions in attachment directories. Monitor for requests to non-standard executable files (e.g., .php, .py, .sh) in upload folders. System monitoring should be configured to alert on suspicious processes being spawned by the web server's user account or any unexpected outbound network connections from the server.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to mitigate risk:
- Deploy a Web Application Firewall (WAF) with rules to inspect and block malicious file uploads, focusing on file content and type validation.
- Temporarily disable the file attachment functionality if it is not critical to business operations.
- Enforce file system permissions to prevent execution of any files within the upload directory (e.g., set the
noexecflag). - Enhance network segmentation to limit the compromised server's ability to communicate with other critical internal systems.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Due to the critical severity of this vulnerability, we strongly recommend that organizations prioritize applying the vendor-supplied patches to all affected systems immediately. The potential for complete system compromise represents an unacceptable risk. While this CVE is not yet on the CISA KEV list, its high impact makes it an attractive target for attackers. If patching cannot be performed immediately, the compensating controls outlined above must be implemented as a matter of urgency to reduce the attack surface.