CVE-2025-56381

ERPNEXT v15.67.0 was discovered to contain multiple SQL injection vulnerabilities in the /api/method/frappe.desk.reportview.get endpoint via the order_by and group_by parameters.
References
Link Resource
https://github.com/MoAlali/ Not Applicable
https://github.com/MoAlali/CVE-2025-56381 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:frappe:erpnext:15.67.0:*:*:*:*:*:*:*
cpe:2.3:a:frappe:frappe:15.72.4:*:*:*:*:*:*:*

History

03 Oct 2025, 16:18

Type Values Removed Values Added
First Time Frappe frappe
Frappe erpnext
Frappe
CPE cpe:2.3:a:frappe:frappe:15.72.4:*:*:*:*:*:*:*
cpe:2.3:a:frappe:erpnext:15.67.0:*:*:*:*:*:*:*
References () https://github.com/MoAlali/ - () https://github.com/MoAlali/ - Not Applicable
References () https://github.com/MoAlali/CVE-2025-56381 - () https://github.com/MoAlali/CVE-2025-56381 - Exploit, Third Party Advisory

02 Oct 2025, 18:15

Type Values Removed Values Added
CWE CWE-89
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

02 Oct 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-02 14:15

Updated : 2025-10-03 16:18


NVD link : CVE-2025-56381

Mitre link : CVE-2025-56381

CVE.ORG link : CVE-2025-56381


JSON object : View

Products Affected

frappe

  • erpnext
  • frappe
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')