This article is a part of our Vulnerability Database (back to index)

Cross-site Scripting occurrences in Erpnext

Frappe ERPNext 12.29.0 is vulnerable to XSS where the software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (2022-08-22, CVE-2022-28598)

ERPNext in versions v12.0.9-v13.0.3 are affected by a stored XSS vulnerability that allows low privileged users to store malicious scripts in the ‘username’ field in ‘my settings’ which can lead to full account takeover. (2022-06-22, CVE-2022-23058)

In ERPNext, versions v12.0.9--v13.0.3 are vulnerable to Stored Cross-Site-Scripting (XSS), due to user input not being validated properly. A low privileged attacker could inject arbitrary code into input fields when editing his profile. (2022-06-22, CVE-2022-23057)

In ERPNext, versions v13.0.0-beta.13 through v13.30.0 are vulnerable to Stored XSS at the Patient History page which allows a low privilege user to conduct an account takeover attack. (2022-06-22, CVE-2022-23056)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the address/ URI. (2020-03-19, CVE-2019-20514)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the addresses/ URI. (2020-03-19, CVE-2019-20515)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the api/ URI. (2020-03-19, CVE-2019-20521)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the api/method/ URI. (2020-03-19, CVE-2019-20520)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the blog/ URI. (2020-03-19, CVE-2019-20516)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the contact/ URI. (2020-03-19, CVE-2019-20517)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the project/ URI. (2020-03-19, CVE-2019-20518)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the user/ URI, as demonstrated by a crafted e-mail address. (2020-03-19, CVE-2019-20519)

ERPNext 11.1.47 allows blog?blog_category= Frame Injection. (2020-03-18, CVE-2019-20511)

An XSS issue was discovered in Frappe ERPNext v11.x.x-develop b1036e5 via a comment. (2018-05-22, CVE-2018-11339)

Why Cross-site Scripting can be dangerous

Cross site scripting is an attack where a web page executes code that is injected by an adversary. It usually appears, when users input is presented. This attack can be used to impersonate a user, take over control of the session, or even steal API keys.

The attack can be executed e.g. when you application injects the request parameter directly into the HTML code of the page returned to the user:

https://server.com/confirmation?message=Transaction+Complete

what results in:

<span>Confirmation: Transaction Complete</span>

In that case the message can be modified to become a valid Javascript code, e.g.:

https://server.com/confirmation?message=<script>dangerous javascript code here</script>

and it will be executed locally by the user's browser with full access to the user's personal application/browser data:

<span>Confirmation: <script>dangerous javascript code here</script></span>

Scan Your Web App Now
Scan your application
for 14 days for free

No credit card is required. No commitment.

Sign Up Free