CVE-2025-58439

ERP is a free and open source Enterprise Resource Planning tool. In versions below 14.89.2 and 15.0.0 through 15.75.1, lack of validation of parameters left certain endpoints vulnerable to error-based SQL Injection. Some information like version could be retrieved. This issue is fixed in versions 14.89.2 and 15.76.0.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:frappe:erpnext:*:*:*:*:*:*:*:*
cpe:2.3:a:frappe:erpnext:*:*:*:*:*:*:*:*

History

27 Oct 2025, 18:03

Type Values Removed Values Added
First Time Frappe
Frappe erpnext
CPE cpe:2.3:a:frappe:erpnext:*:*:*:*:*:*:*:*
References () https://github.com/frappe/erpnext/pull/49219 - () https://github.com/frappe/erpnext/pull/49219 - Issue Tracking
References () https://github.com/frappe/erpnext/pull/49220 - () https://github.com/frappe/erpnext/pull/49220 - Issue Tracking
References () https://github.com/frappe/erpnext/security/advisories/GHSA-fvjw-5w9q-6v39 - () https://github.com/frappe/erpnext/security/advisories/GHSA-fvjw-5w9q-6v39 - Vendor Advisory

06 Sep 2025, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-06 01:15

Updated : 2025-10-27 18:03


NVD link : CVE-2025-58439

Mitre link : CVE-2025-58439

CVE.ORG link : CVE-2025-58439


JSON object : View

Products Affected

frappe

  • erpnext
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')