CVE-2026-32954

ERP is a free and open source Enterprise Resource Planning tool. In versions prior to 16.8.0 and 15.100.0, certain endpoints were vulnerable to time-based and boolean-based blind SQL injection due to insufficient parameter validation, allowing attackers to infer database information. This issue has been fixed in versions 15.100.0 and 16.8.0.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:frappe:erpnext:*:*:*:*:*:*:*:*
cpe:2.3:a:frappe:erpnext:*:*:*:*:*:*:*:*

History

23 Mar 2026, 19:35

Type Values Removed Values Added
References () https://github.com/frappe/erpnext/releases/tag/v15.100.0 - () https://github.com/frappe/erpnext/releases/tag/v15.100.0 - Product, Release Notes
References () https://github.com/frappe/erpnext/releases/tag/v16.8.0 - () https://github.com/frappe/erpnext/releases/tag/v16.8.0 - Product, Release Notes
References () https://github.com/frappe/erpnext/security/advisories/GHSA-j669-ghv2-gmqg - () https://github.com/frappe/erpnext/security/advisories/GHSA-j669-ghv2-gmqg - Vendor Advisory
First Time Frappe erpnext
Frappe
Summary
  • (es) ERP es una herramienta de Planificación de Recursos Empresariales de código abierto y gratuita. En versiones anteriores a la 16.8.0 y la 15.100.0, ciertos puntos finales eran vulnerables a inyección SQL ciega basada en tiempo y basada en booleanos debido a una validación de parámetros insuficiente, permitiendo a los atacantes inferir información de la base de datos. Este problema ha sido solucionado en las versiones 15.100.0 y 16.8.0.
CPE cpe:2.3:a:frappe:erpnext:*:*:*:*:*:*:*:*

20 Mar 2026, 05:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-20 05:16

Updated : 2026-03-23 19:35


NVD link : CVE-2026-32954

Mitre link : CVE-2026-32954

CVE.ORG link : CVE-2026-32954


JSON object : View

Products Affected

frappe

  • erpnext
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')