In Frappe ErpNext v15.57.5, the function get_timesheet_detail_rate() at erpnext/projects/doctype/timesheet/timesheet.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting SQL query into the timelog parameter.
References
Configurations
History
03 Oct 2025, 16:19
Type | Values Removed | Values Added |
---|---|---|
First Time |
Frappe erpnext
Frappe |
|
References | () https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/blob/main/2025/Frappe%20Framework%20-%20Multiple%20SQL%20Injection.md - Exploit, Third Party Advisory | |
References | () https://github.com/frappe/erpnext/pull/49192/commits/e563ed0c75fd20135a6ad288e957e75eac7d3b8d - Patch | |
CPE | cpe:2.3:a:frappe:erpnext:15.57.5:*:*:*:*:*:*:* |
30 Sep 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
30 Sep 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-30 14:15
Updated : 2025-10-03 16:19
NVD link : CVE-2025-52049
Mitre link : CVE-2025-52049
CVE.ORG link : CVE-2025-52049
JSON object : View
Products Affected
frappe
- erpnext
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')