Frappe is a full-stack web application framework. Prior to versions 14.91.0 and 15.52.0, a system user was able to create certain documents in a specific way that could lead to remote code execution. Versions 14.9.1 and 15.52.0 contain a patch for the vulnerability. There's no workaround; an upgrade is required.
References
Link | Resource |
---|---|
https://github.com/frappe/frappe/security/advisories/GHSA-v342-4xr9-x3q3 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
01 Aug 2025, 15:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-noinfo | |
References | () https://github.com/frappe/frappe/security/advisories/GHSA-v342-4xr9-x3q3 - Vendor Advisory | |
First Time |
Frappe
Frappe frappe |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
27 Mar 2025, 16:45
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
25 Mar 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-25 15:15
Updated : 2025-08-01 15:29
NVD link : CVE-2025-30213
Mitre link : CVE-2025-30213
CVE.ORG link : CVE-2025-30213
JSON object : View
Products Affected
frappe
- frappe
CWE