Frappe
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Frappe product.
RSS Feeds for Frappe security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Frappe products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Frappe Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 26 vulnerabilities in Frappe with an average score of 7.1 out of ten. Last year, in 2025 Frappe had 46 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Frappe in 2026 could surpass last years number. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.26.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 26 | 7.14 |
| 2025 | 46 | 6.88 |
| 2024 | 4 | 6.47 |
| 2023 | 4 | 7.20 |
| 2022 | 7 | 5.76 |
| 2021 | 0 | 0.00 |
| 2020 | 13 | 6.40 |
| 2019 | 4 | 6.10 |
| 2018 | 2 | 0.00 |
It may take a day or so for new Frappe vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Frappe Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-41430 | Apr 24, 2026 |
Frappe Press Login Reflected XSS via Redirect ParamPress, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). Redirect parameter on login page is vulnerable to reflected XSS. The patch in commit 16d1b6ca2559f858a1de77bcb03fd7f1b81671c6 fixes the issue by restricting redirects to internal URLs only. |
|
| CVE-2026-41317 | Apr 24, 2026 |
Press CSRF via GET on create_api_secret EndpointPress, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS).`press.api.account.create_api_secret` is prone to CSRF-like exploits. This endpoint writes to database and it is also accessible via GET method. The patch in commit 52ea2f2d1b587be0807557e96f025f47897d00fd restricts method to POST. |
|
| CVE-2026-3837 | Apr 22, 2026 |
Frappe 16.10.0 XSS via formatter interpolation in Desk documentsAn authenticated attacker can persist crafted values in multiple field types and trigger client-side script execution when another user opens the affected document in Desk. The vulnerable formatter implementations interpolate stored values into raw HTML attributes and element content without escaping This issue affects Frappe: 16.10.0. |
|
| CVE-2026-3673 | Apr 22, 2026 |
Frappe 16.10.10 XSS via Unescaped _user_tags in List/Report ViewAn authenticated attacker can store a crafted tag value in _user_tags and trigger JavaScript execution when a victim opens the list/report view where tags are rendered. The vulnerable renderer interpolates tag content into HTML attributes and element content without escaping. This issue affects Frappe: 16.10.10. |
|
| CVE-2026-41320 | Apr 21, 2026 |
SQLi in Frappe HR v<15.54.0 / v<14.38.1 EndpointFrappe HR is an open-source human resources management solution (HRMS). Prior to versions 15.54.0 and 14.38.1, a specially crafted request made to a certain endpoint could result in SQL injection, allowing an attacker to extract information they wouldn't otherwise be able to. Versions 15.54.0 and 14.38.1 contain a patch. No known workarounds are available. |
|
| CVE-2026-40889 | Apr 21, 2026 |
Unauthorized File Access via API in Frappe HR <v15.58.2/16.4.2Frappe HR is an open-source human resources management solution (HRMS). Prior to versions 15.58.2 and 16.4.2, authenticated users can access unauthorized files by exploiting certain api endpoint. Versions 15.58.2 and 16.4.2 contain a patch. No known workarounds are available. |
|
| CVE-2026-40888 | Apr 21, 2026 |
Frappe HRMS Authenticated Info Disclosure Via API before 15.58.1 & 16.4.1Frappe HR is an open-source human resources management solution (HRMS). Prior to versions 15.58.1 and 16.4.1, an authenticated user with default role can access unauthorized information by exploiting certain api endpoint. Versions 15.58.1 and 16.4.1 contain a patch. No known workarounds are available. |
|
| CVE-2026-39415 | Apr 08, 2026 |
Frappe LMS <2.46.0: ClientSide Score ModificationFrappe Learning Management System (LMS) is a learning system that helps users structure their content. Prior to 2.46.0, a vulnerability has been identified in Frappe Learning where quiz scores can be modified by students before submission. The application currently relies on client-side calculated scores, which can be altered using browser developer tools prior to sending the submission request. While this does not allow modification of other users data or privilege escalation, it compromises the integrity of quiz results and undermines academic reliability. This issue affects data integrity but does not expose confidential information or allow unauthorized access to other accounts. This vulnerability is fixed in 2.46.0. |
|
| CVE-2026-31017 | Apr 08, 2026 |
SSRF via PDF Render in ERPNext 16.0.1 Print FormatA Server-Side Request Forgery (SSRF) vulnerability exists in the Print Format functionality of ERPNext v16.0.1 and Frappe Framework v16.1.1, where user-supplied HTML is insufficiently sanitized before being rendered into PDF. When generating PDFs from user-controlled HTML content, the application allows the inclusion of HTML elements such as <iframe> that reference external resources. The PDF rendering engine automatically fetches these resources on the server side. An attacker can abuse this behavior to force the server to make arbitrary HTTP requests to internal services, including cloud metadata endpoints, potentially leading to sensitive information disclosure. |
|
| CVE-2026-39351 | Apr 07, 2026 |
Frappe <16.14.0/15.104.0 Unrestricted Doctype API AccessFrappe is a full-stack web application framework. Prior to 16.14.0 and 15.104.0, Frappe allows unrestricted Doctype access via API exploit. |
|
| CVE-2026-35614 | Apr 07, 2026 |
Frappe SQLi via bulk_update v<16.14.0 & v<15.104.0Frappe is a full-stack web application framework. Prior to 16.14.0 and 15.104.0, Frappe has a SQL injection in bulk_update. This vulnerability is fixed in 16.14.0 and 15.104.0. |
|
| CVE-2026-34606 | Apr 02, 2026 |
Frappe LMS stored XSS 2.27.0-2.47.9 (fixed 2.48.0)Frappe Learning Management System (LMS) is a learning system that helps users structure their content. From version 2.27.0 to before version 2.48.0, Frappe LMS was vulnerable to stored XSS. This issue has been patched in version 2.48.0. |
|
| CVE-2026-32954 | Mar 20, 2026 |
ERP <16.8.0/15.100.0: Time/Boolean Blind SQLi via API EndpointsERP is a free and open source Enterprise Resource Planning tool. In versions prior to 16.8.0 and 15.100.0, certain endpoints were vulnerable to time-based and boolean-based blind SQL injection due to insufficient parameter validation, allowing attackers to infer database information. This issue has been fixed in versions 15.100.0 and 16.8.0. |
|
| CVE-2026-31879 | Mar 11, 2026 |
Frappe <=16.10.0 Privilege Escalation & Stored XSS in WorkspacesFrappe is a full-stack web application framework. Prior to 14.100.2, 15.101.0, and 16.10.0, due to a lack of validation and improper permission checks, users could modify other user's private workspaces. Specially crafted requests could lead to stored XSS here. This vulnerability is fixed in 14.100.2, 15.101.0, and 16.10.0. |
|
| CVE-2026-31878 | Mar 11, 2026 |
SSRF in Frappe Endpoint (<14.100.1,<15.100.0,<16.6.0)Frappe is a full-stack web application framework. Prior to 14.100.1, 15.100.0, and 16.6.0, a malicious user could send a crafted request to an endpoint which would lead to the server making an HTTP call to a service of the user's choice. This vulnerability is fixed in 14.100.1, 15.100.0, and 16.6.0. |
|
| CVE-2026-31877 | Mar 11, 2026 |
SQL Injection in Frappe Endpoint Pre-15.84.0/14.99.0 (CVE-2026-31877)Frappe is a full-stack web application framework. Prior to 15.84.0 and 14.99.0, a specially crafted request made to a certain endpoint could result in SQL injection, allowing an attacker to extract information they wouldn't otherwise be able to. This vulnerability is fixed in 15.84.0 and 14.99.0. |
|
| CVE-2026-29081 | Mar 05, 2026 |
SQLi in Frappe web framework before v14.100.1 & v15.100.0Frappe is a full-stack web application framework. Prior to versions 14.100.1 and 15.100.0, an endpoint was vulnerable to SQL injection through specially crafted requests, which would allow a malicious actor to extract sensitive information. This issue has been patched in versions 14.100.1 and 15.100.0. |
|
| CVE-2026-29077 | Mar 05, 2026 |
Document Sharing Privilege Escalation in Frappe <15.98.0 / <14.100.0Frappe is a full-stack web application framework. Prior to versions 15.98.0 and 14.100.0, due to a lack of validation when sharing documents, a user could share a document with a permission that they themselves didn't have. This issue has been patched in versions 15.98.0 and 14.100.0. |
|
| CVE-2026-28436 | Mar 05, 2026 |
Frappe XSS via Crafted Image URL before v16.11.0/15.102.0Frappe is a full-stack web application framework. Prior to versions 16.11.0 and 15.102.0, an attacker can set a crafted image URL that results in XSS when the avatar is displayed, and it can be triggered for other users via website page comments. This issue has been patched in versions 16.11.0 and 15.102.0. |
|
| CVE-2026-27471 | Feb 21, 2026 |
Unauthorized Document Access in ERPNext <=15.98.0,16.0.0-rc.1&<=16.6.0 (CVE-2026-27471)ERP is a free and open source Enterprise Resource Planning tool. In versions up to 15.98.0 and 16.0.0-rc.1 and through 16.6.0, certain endpoints lacked access validation which allowed for unauthorized document access. This issue has been fixed in versions 15.98.1 and 16.6.1. |
|
| CVE-2026-26977 | Feb 20, 2026 |
Unauthorized API Access in Frappe LMS 2.44.0 (before 2.45.0)Frappe Learning Management System (LMS) is a learning system that helps users structure their content. In versions 2.44.0 and below, unauthorized users are able to access the details of unpublished courses via API endpoints. A fix for this issue is planned for the 2.45.0 release. |
|
| CVE-2026-26031 | Feb 11, 2026 |
Unauth Enum Enrolled Students via Batch in Frappe LMS <2.44.0Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Prior to 2.44.0, security issue was identified in Frappe Learning, where unauthorised users were able to access the full list of enrolled students (by email) in batches. This vulnerability is fixed in 2.44.0. |
|
| CVE-2026-25956 | Feb 10, 2026 |
Frappe <=15.94.0: Open Redirect/Reflected XSS via Bad Signup URLFrappe is a full-stack web application framework. Prior to 14.99.14 and 15.94.0, an attacker could craft a malicious signup URL for a frappe site which could lead to an open redirect (or reflected XSS, depending on the crafted payload) when a user signs up. This vulnerability is fixed in 14.99.14 and 15.94.0. |
|
| CVE-2025-65923 | Feb 03, 2026 |
ERPNext 15.88.1 CSV Import Stored XSS via Update Existing RecordsA Stored Cross-Site Scripting (XSS) vulnerability was discovered within the CSV import mechanism of ERPNext thru 15.88.1 when using the Update Existing Recordsoption. An attacker can embed malicious JavaScript code into a CSV field, which is then stored in the database and executed whenever the affected record is viewed by a user within the ERPNext web interface. This exposure may allow an attacker to compromise user sessions or perform unauthorized actions under the context of a victim's account. |
|
| CVE-2026-23497 | Jan 14, 2026 |
Stored XSS in Frappe LMS 2.44.0 via Image FilenameFrappe Learning Management System (LMS) is a learning system that helps users structure their content. In 2.44.0 and earlier, there is a stored XSS vulnerability where a specially crafted image filename could execute malicious JavaScript when rendered on course or jobs pages. |
|
| CVE-2025-68953 | Jan 05, 2026 |
Frappe Framework 14.99.5-15.80.1 Path Traversal via Unsanitized RequestsFrappe is a full-stack web application framework. Versions 14.99.5 and below and 15.0.0 through 15.80.1 include requests that are vulnerable to path traversal attacks. Arbitrary files from the server could be retrieved due to a lack of proper sanitization on some requests. This issue is fixed in versions 14.99.6 and 15.88.1. To workaround, changing the setup to use a reverse proxy is recommended. |
|
| CVE-2025-68929 | Dec 29, 2025 |
Frappe is a full-stack web application frameworkFrappe is a full-stack web application framework. Prior to versions 14.99.6 and 15.88.1, an authenticated user with specific permissions could be tricked into accessing a specially crafted link. This could lead to a malicious template being executed on the server, resulting in remote code execution. Versions 14.99.6 and 15.88.1 fix the issue. No known workarounds are available. |
|
| CVE-2025-68928 | Dec 29, 2025 |
Frappe CRM is an open-source customer relationship management toolFrappe CRM is an open-source customer relationship management tool. Prior to version 1.56.2, authenticated users could set crafted URLs in a website field, which were not sanitized, causing cross-site scripting. Version 1.56.2 fixes the issue. No known workarounds are available. |
|
| CVE-2025-66436 | Dec 15, 2025 |
SSTI in Frappe ERPNext <=15.89.0 via Jinja Terms injectionAn SSTI (Server-Side Template Injection) vulnerability exists in the get_terms_and_conditions method of Frappe ERPNext through 15.89.0. The function renders attacker-controlled Jinja2 templates (terms) using frappe.render_template() with a user-supplied context (doc). Although Frappe uses a custom SandboxedEnvironment, several dangerous globals such as frappe.db.sql are still available in the execution context via get_safe_globals(). An authenticated attacker with access to create or modify a Terms and Conditions document can inject arbitrary Jinja expressions into the terms field, resulting in server-side code execution within a restricted but still unsafe context. This vulnerability can be used to leak database information. |
|
| CVE-2025-66437 | Dec 15, 2025 |
ERPNext 15.89.0: SSTI via get_address_display (Jinja Sandbox Bypass)An SSTI (Server-Side Template Injection) vulnerability exists in the get_address_display method of Frappe ERPNext through 15.89.0. This function renders address templates using frappe.render_template() with a context derived from the address_dict parameter, which can be either a dictionary or a string referencing an Address document. Although ERPNext uses a custom Jinja2 SandboxedEnvironment, dangerous functions like frappe.db.sql remain accessible via get_safe_globals(). An authenticated attacker with permission to create or modify an Address Template can inject arbitrary Jinja expressions into the template field. By creating an Address document with a matching country, and then calling the get_address_display API with address_dict="address_name", the system will render the malicious template using attacker-controlled data. This leads to server-side code execution or database information disclosure. |
|
| CVE-2025-66438 | Dec 15, 2025 |
SSTI in Frappe ERPNext 15.89.0 Print Format RenderingA Server-Side Template Injection (SSTI) vulnerability exists in the Frappe ERPNext through 15.89.0 Print Format rendering mechanism. Specifically, the API frappe.www.printview.get_html_and_style() triggers the rendering of the html field inside a Print Format document using frappe.render_template(template, doc) via the get_rendered_template() call chain. Although ERPNext wraps Jinja2 in a SandboxedEnvironment, it exposes sensitive functions such as frappe.db.sql through get_safe_globals(). An authenticated attacker with permission to create or modify a Print Format can inject arbitrary Jinja expressions into the html field. Once the malicious Print Format is saved, the attacker can call get_html_and_style() with a target document (e.g., Supplier or Sales Invoice) to trigger the render process. This leads to information disclosure from the database, such as database version, schema details, or sensitive values, depending on the injected payload. Exploitation flow: Create a Print Format with SSTI payload in the html field; call the get_html_and_style() API; triggers frappe.render_template(template, doc) inside get_rendered_template(); leaks database information via frappe.db.sql or other exposed globals. |
|
| CVE-2025-66439 | Dec 15, 2025 |
ERPNext v15.89.0 - SQLi via get_outstanding_reference_documents() in payment_entry.pyAn issue was discovered in Frappe ERPNext through 15.89.0. Function get_outstanding_reference_documents() at erpnext.accounts.doctype.payment_entry.payment_entry.py is vulnerable to SQL Injection. It allows an attacker to extract arbitrary data from the database by injecting SQL payloads via the from_posting_date parameter, which is directly interpolated into the query without proper sanitization or parameter binding. |
|
| CVE-2025-66440 | Dec 15, 2025 |
SQLi in Frappe ERPNext 15.89.0 via to_posting_dateAn issue was discovered in Frappe ERPNext through 15.89.0. Function get_outstanding_reference_documents() at erpnext/accounts/doctype/payment_entry/payment_entry.py is vulnerable to SQL Injection. It allows an attacker to extract arbitrary data from the database by injecting SQL payloads via the to_posting_date parameter, which is directly interpolated into the query without proper sanitization or parameter binding. |
|
| CVE-2025-66434 | Dec 15, 2025 |
SSTI in Frappe ERPNext (15.89.0) get_dunning_letter_text allows code execAn SSTI (Server-Side Template Injection) vulnerability exists in the get_dunning_letter_text method of Frappe ERPNext through 15.89.0. The function renders attacker-controlled Jinja2 templates (body_text) using frappe.render_template() with a user-supplied context (doc). Although Frappe uses a custom SandboxedEnvironment, several dangerous globals such as frappe.db.sql are still available in the execution context via get_safe_globals(). An authenticated attacker with access to configure Dunning Type and its child table Dunning Letter Text can inject arbitrary Jinja expressions, resulting in server-side code execution within a restricted but still unsafe context. This can leak database information. |
|
| CVE-2025-66435 | Dec 15, 2025 |
SSTI in Frappe ERPNext 15.89.0 get_contract_template: Authenticated RCEAn SSTI (Server-Side Template Injection) vulnerability exists in the get_contract_template method of Frappe ERPNext through 15.89.0. The function renders attacker-controlled Jinja2 templates (contract_terms) using frappe.render_template() with a user-supplied context (doc). Although Frappe uses a custom SandboxedEnvironment, several dangerous globals such as frappe.db.sql are still available in the execution context via get_safe_globals(). An authenticated attacker with access to create or modify a Contract Template can inject arbitrary Jinja expressions into the contract_terms field, resulting in server-side code execution within a restricted but still unsafe context. This vulnerability can be used to leak database information. |
|
| CVE-2025-67734 | Dec 12, 2025 |
Frappe LMS XSS via Company Website Field < 2.42.0Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Versions prior to 2.42.0 allowed authenticated attackers to enter JavaScript through the Company Website field of the Job Form, exposing users to an XSS attack. The script could then be executed in the browsers of users who opened the malicious job posting. This issue is fixed in version 2.42.0. |
|
| CVE-2025-67730 | Dec 12, 2025 |
Frappe LMS <2.42.0 Authenticated XSS via Description Fields (CVE-2025-67730)Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Versions prior to 2.42.0 allow authenticated users to add malicious HTML and JavaScript through description fields in the Job, Course and Batch forms. This issue is fixed in version 2.42.0. |
|
| CVE-2025-10655 | Dec 09, 2025 |
SQLi in Frappe HelpDesk 1.14.0 get_dashboard_dataSQL Injection in Frappe HelpDesk in the dashboard get_dashboard_data due to unsafe concatenation of user-controlled parameters into dynamic SQL statements.This issue affects Frappe HelpDesk: 1.14.0. |
|
| CVE-2025-66581 | Dec 05, 2025 |
CVE-2025-66581: Frappe LMS <2.41 Auth Bypass for Low-Priv UsersFrappe Learning Management System (LMS) is a learning system that helps users structure their content. Prior to 2.41.0, a flaw in the server-side authorization logic allowed authenticated users to perform actions beyond their assigned roles across multiple features. Because the affected endpoints relied on client-side or UI-level checks instead of enforcing permissions on the server, users with low-privileged roles (such as students) could perform operations intended only for instructors or administrators via directly using the API's. This vulnerability is fixed in 2.41.0. |
|
| CVE-2025-66206 | Dec 01, 2025 |
Frappe Path Traversal via werkzeug/gunicorn, pre 15.86.0/14.99.2Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, certain requests were vulnerable to path traversal attacks, wherein some files from the server could be retrieved if the full path was known. Sites hosted on Frappe Cloud, and even other setups that are behind a reverse proxy like NGINX are unaffected. This would mainly affect someone directly using werkzeug/gunicorn. In those cases, either an upgrade or changing the setup to use a reverse proxy is recommended. This vulnerability is fixed in 15.86.0 and 14.99.2. |
|
| CVE-2025-66205 | Dec 01, 2025 |
SQLi in Frappe 15/14 Endpoints Prior to 15.86.0/14.99.2 (Error-based)Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, a certain endpoint was vulnerable to error-based SQL injection due to lack of validation of parameters. Some information like version could be retrieved. This vulnerability is fixed in 15.86.0 and 14.99.2. |
|
| CVE-2025-11461 | Nov 26, 2025 |
SQLi in Frappe CRM 1.53.1 Dashboard Controller via unsafe concatMultiple SQL Injections in Frappe CRM Dashboard Controller due to unsafe concatenation of user-controlled parameters into dynamic SQL statements. This issue affects Frappe CRM: 1.53.1. |
|
| CVE-2025-64707 | Nov 12, 2025 |
Frappe Learning 2.0-2.40.9 Role Revocation Delay via Cache (CVE-2025-64707)Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, when admins revoked a role from the user, the effect was not immediate because of caching. The issue has been fixed in version 2.41.0 by ensuring the cache is cleared after roles are updated. |
|
| CVE-2025-64705 | Nov 12, 2025 |
Frappe Learning <2.41.0: Unauthorized VIEW SubmissionsFrappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, users were able to access the submissions made by other students The issue has been fixed in version 2.41.0 by ensuring proper roles and redirecting if accessed via direct URL. |
|
| CVE-2025-62779 | Oct 27, 2025 |
"Frappe Learning 2.39.1 HTML Injection in Job Form (CVE-2025-62779)"Frappe Learning is a learning system that helps users structure their content. In Frappe Learning 2.39.1 and earlier, users were able to add HTML through input fields in the Job Form. |
|
| CVE-2025-62778 | Oct 27, 2025 |
Frappe Learning <=2.39.1: Quiz Form Access Control BypassFrappe Learning is a learning management system. A security issue was identified in Frappe Learning 2.39.1 and earlier, where students were able to access the Quiz Form if they had the URL. |
|
| CVE-2025-62407 | Oct 16, 2025 |
Open Redirect via login redirect arg in Frappe before 14.98.0/15.83.0Frappe is a full-stack web application framework. Prior to 14.98.0 and 15.83.0, an open redirect was possible through the redirect argument on the login page, if a specific type of URL was passed in. This vulnerability is fixed in 14.98.0 and 15.83.0. |
|
| CVE-2025-62158 | Oct 10, 2025 |
Frappe Learning: Public File Disclosure in Assignment Attachments (pre2.38.0)Frappe Learning is a learning system that helps users structure their content. In versions prior to 2.38.0, the system did stored the attachments uploaded by the students in their assignments as public files. This issue potentially exposed student-uploaded files to the public. Anyone with the file URL could access these files without authentication. The issue has been fixed in version 2.38.0 by ensuring all student-uploaded assignment attachments are stored as private files by default. |
|
| CVE-2025-11283 | Oct 05, 2025 |
Frappe LMS XSS in Course Handler (2.35.0) via DescriptionA vulnerability was determined in Frappe LMS 2.35.0. This affects an unknown function of the component Course Handler. Executing manipulation of the argument Description can lead to cross site scripting. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. It is suggested to upgrade the affected component. The vendor was informed early about a total of four security issues and confirmed that those have been fixed. However, the release notes on GitHub do not mention them. |
|
| CVE-2025-11282 | Oct 05, 2025 |
XSS vuln in Frappe LMS 2.35.0 (CVE-2025-11282)A vulnerability was found in Frappe LMS 2.34.x/2.35.0. The impacted element is an unknown function of the component Incomplete Fix CVE-2025-55006. Performing a manipulation results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The affected component should be upgraded. The vendor was informed early about a total of four security issues and confirmed that those have been fixed. However, the release notes on GitHub do not mention them. |
|