Home

Description

In ERPNext v15.83.2 and Frappe Framework v15.86.0, improper validation of uploaded SVG avatar images allows attackers to embed malicious JavaScript. The payload executes when an administrator clicks the image link to view the avatar, resulting in stored cross-site scripting (XSS). Successful exploitation may lead to account takeover, privilege escalation, or full compromise of the affected ERPNext instance.

PUBLISHED Reserved 2025-11-18 | Published 2025-12-03 | Updated 2025-12-03 | Assigner mitre

References

github.com/frappe/frappe

github.com/frappe/erpnext

github.com/PhDg1410/CVE/tree/main/CVE-2025-65267

cve.org (CVE-2025-65267)

nvd.nist.gov (CVE-2025-65267)