CVE-2026-31878

Frappe is a full-stack web application framework. Prior to 14.100.1, 15.100.0, and 16.6.0, a malicious user could send a crafted request to an endpoint which would lead to the server making an HTTP call to a service of the user's choice. This vulnerability is fixed in 14.100.1, 15.100.0, and 16.6.0.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*
cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*
cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*

History

13 Mar 2026, 17:49

Type Values Removed Values Added
References () https://github.com/frappe/frappe/security/advisories/GHSA-mggg-hmjm-j6c2 - () https://github.com/frappe/frappe/security/advisories/GHSA-mggg-hmjm-j6c2 - Vendor Advisory
First Time Frappe frappe
Frappe
CPE cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*
Summary
  • (es) Frappe es un framework de aplicación web full-stack. Antes de 14.100.1, 15.100.0 y 16.6.0, un usuario malicioso podría enviar una solicitud manipulada a un endpoint lo que llevaría al servidor a realizar una llamada HTTP a un servicio de la elección del usuario. Esta vulnerabilidad está corregida en 14.100.1, 15.100.0 y 16.6.0.

11 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-11 19:16

Updated : 2026-03-13 17:49


NVD link : CVE-2026-31878

Mitre link : CVE-2026-31878

CVE.ORG link : CVE-2026-31878


JSON object : View

Products Affected

frappe

  • frappe
CWE
CWE-918

Server-Side Request Forgery (SSRF)