
CVE-2025-30217 – Frappe has possibility of SQL injection due to improper validations
https://notcve.org/view.php?id=CVE-2025-30217
26 Mar 2025 — Frappe is a full-stack web application framework. Prior to versions 14.93.2 and 15.55.0, a SQL Injection vulnerability has been identified in Frappe Framework which could allow a malicious actor to access sensitive information. Versions 14.93.2 and 15.55.0 contain a patch for the issue. No known workarounds are available. • https://github.com/frappe/frappe/security/advisories/GHSA-6phg-4wmq-h5h3 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2025-30214 – Frappe vulnerable to information disclosure leading to account takeover
https://notcve.org/view.php?id=CVE-2025-30214
25 Mar 2025 — Frappe is a full-stack web application framework. Prior to versions 14.89.0 and 15.51.0, making crafted requests could lead to information disclosure that could further lead to account takeover. Versions 14.89.0 and 15.51.0 fix the issue. There's no workaround to fix this without upgrading. • https://github.com/frappe/frappe/security/advisories/GHSA-qrv3-jc3h-f3m6 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-287: Improper Authentication •

CVE-2025-30213 – Frappe has Possibility of Remote Code Execution due to improper validation
https://notcve.org/view.php?id=CVE-2025-30213
25 Mar 2025 — Frappe is a full-stack web application framework. Prior to versions 14.91.0 and 15.52.0, a system user was able to create certain documents in a specific way that could lead to remote code execution. Versions 14.9.1 and 15.52.0 contain a patch for the vulnerability. There's no workaround; an upgrade is required. • https://github.com/frappe/frappe/security/advisories/GHSA-v342-4xr9-x3q3 • CWE-20: Improper Input Validation •

CVE-2025-30212 – Frappe has possibility of SQL injection due to improper validations
https://notcve.org/view.php?id=CVE-2025-30212
25 Mar 2025 — Frappe is a full-stack web application framework. An SQL Injection vulnerability has been identified in Frappe Framework prior to versions 14.89.0 and 15.51.0 which could allow a malicious actor to access sensitive information. Versions 14.89.0 and 15.51.0 fix the issue. Upgrading is required; no other workaround is present. • https://github.com/frappe/frappe/commit/27f13437db161a173137d91cd07d0f9287d7c556 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2024-50356 – Press has a potential 2FA bypass
https://notcve.org/view.php?id=CVE-2024-50356
31 Oct 2024 — Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn't be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug. • https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6 • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •

CVE-2024-49751 – Frappe Press possible HTML injection through SaaS Signup inputs
https://notcve.org/view.php?id=CVE-2024-49751
23 Oct 2024 — Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). Prior to commit 5d118a902872d7941f099ad1fb918e2421e79ccd, a user could inject HTML through SaaS signup inputs. The user who injected the unsafe HTML code would only affect themselves and would not affect other users. Commit 5d118a902872d7941f099ad1fb918e2421e79ccd patches this bug. • https://github.com/frappe/press/commit/5d118a902872d7941f099ad1fb918e2421e79ccd • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-34074 – Frappe vuilnerable to an open redirect on login page
https://notcve.org/view.php?id=CVE-2024-34074
09 May 2024 — Frappe is a full-stack web application framework. Prior to 15.26.0 and 14.74.0, the login page accepts redirect argument and it allowed redirect to untrusted external URls. This behaviour can be used by malicious actors for phishing. This vulnerability is fixed in 15.26.0 and 14.74.0. Frappe es un framework de aplicación web completo. • https://github.com/frappe/frappe/commit/65b3c42635038cdff17d3109be6c373bac004829 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2024-27105 – Frappe File Permissions can by bypassed using certain endpoints
https://notcve.org/view.php?id=CVE-2024-27105
20 Mar 2024 — Frappe is a full-stack web application framework. Prior to versions 14.66.3 and 15.16.0, file permission can be bypassed using certain endpoints, granting less privileged users permission to delete or clone a file. Versions 14.66.3 and 15.16.0 contain a patch for this issue. No known workarounds are available. Frappe es un framework de aplicación web completo. • https://github.com/frappe/frappe/security/advisories/GHSA-hq5v-q29v-7rcw • CWE-863: Incorrect Authorization •

CVE-2024-24813 – Frappe SQL Injection from reporting logic
https://notcve.org/view.php?id=CVE-2024-24813
20 Mar 2024 — Frappe is a full-stack web application framework. Prior to versions 14.64.0 and 15.0.0, SQL injection from a particular whitelisted method can result in access to data which the user doesn't have permission to access. Versions 14.64.0 and 15.0.0 contain a patch for this issue. No known workarounds are available. Frappe es un framework de aplicación web completo. • https://github.com/frappe/frappe/security/advisories/GHSA-fxfv-7gwx-54jh • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2024-24812 – Frappe Authenticated Reflected Cross site scripting (XSS) in portal pages
https://notcve.org/view.php?id=CVE-2024-24812
07 Feb 2024 — Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and a tightly integrated client side library. Prior to versions 14.59.0 and 15.5.0, portal pages are susceptible to Cross-Site Scripting (XSS) which can be used to inject malicious JS code if user clicks on a malicious link. This vulnerability has been patched in versions 14.59.0 and 15.5.0. No known workarounds are available. Frappe es un framework de aplicación web completo que utiliza Python y MariaDB en el l... • https://github.com/frappe/frappe/releases/tag/v14.59.0 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •