ERP is a free and open source Enterprise Resource Planning tool. In versions below 14.89.2 and 15.0.0 through 15.75.1, lack of validation of parameters left certain endpoints vulnerable to error-based SQL Injection. Some information like version could be retrieved. This issue is fixed in versions 14.89.2 and 15.76.0.
References
| Link | Resource |
|---|---|
| https://github.com/frappe/erpnext/pull/49219 | Issue Tracking |
| https://github.com/frappe/erpnext/pull/49220 | Issue Tracking |
| https://github.com/frappe/erpnext/security/advisories/GHSA-fvjw-5w9q-6v39 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-09-06 01:15
Updated : 2025-10-27 18:03
NVD link : CVE-2025-58439
Mitre link : CVE-2025-58439
CVE.ORG link : CVE-2025-58439
JSON object : View
Products Affected
frappe
- erpnext
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
