In Frappe ERPNext 15.57.5, the function get_rfq_containing_supplier() at erpnext/buying/doctype/request_for_quotation/request_for_quotation.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting SQL query via the txt parameter.
References
Configurations
History
03 Oct 2025, 16:19
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:frappe:erpnext:15.57.5:*:*:*:*:*:*:* | |
First Time |
Frappe erpnext
Frappe |
|
References | () https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/blob/main/2025/Frappe%20Framework%20-%20Multiple%20SQL%20Injection.md - Exploit, Third Party Advisory | |
References | () https://github.com/frappe/erpnext/pull/49192/commits/7f2a52ff71a1fd5d4a9034cf217094c0be9f341a - Patch |
01 Oct 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-10-01 15:15
Updated : 2025-10-03 16:19
NVD link : CVE-2025-52042
Mitre link : CVE-2025-52042
CVE.ORG link : CVE-2025-52042
JSON object : View
Products Affected
frappe
- erpnext
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')