Frappe is a full-stack web application framework. Versions 14.99.5 and below and 15.0.0 through 15.80.1 include requests that are vulnerable to path traversal attacks. Arbitrary files from the server could be retrieved due to a lack of proper sanitization on some requests. This issue is fixed in versions 14.99.6 and 15.88.1. To workaround, changing the setup to use a reverse proxy is recommended.
References
Configurations
Configuration 1 (hide)
|
History
09 Jan 2026, 13:55
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:* | |
| References | () https://github.com/frappe/frappe/commit/3867fb112c3f7be1a863e40f19e9235719f784fb - Patch | |
| References | () https://github.com/frappe/frappe/commit/959efd6a498cfaeaf7d4e0ab6cca78c36192d34d - Patch | |
| References | () https://github.com/frappe/frappe/security/advisories/GHSA-xj39-3g4p-f46v - Vendor Advisory | |
| First Time |
Frappe frappe
Frappe |
05 Jan 2026, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-05 22:15
Updated : 2026-01-09 13:55
NVD link : CVE-2025-68953
Mitre link : CVE-2025-68953
CVE.ORG link : CVE-2025-68953
JSON object : View
Products Affected
frappe
- frappe
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
