Home

Description

Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, certain requests were vulnerable to path traversal attacks, wherein some files from the server could be retrieved if the full path was known. Sites hosted on Frappe Cloud, and even other setups that are behind a reverse proxy like NGINX are unaffected. This would mainly affect someone directly using werkzeug/gunicorn. In those cases, either an upgrade or changing the setup to use a reverse proxy is recommended. This vulnerability is fixed in 15.86.0 and 14.99.2.

PUBLISHED Reserved 2025-11-24 | Published 2025-12-01 | Updated 2025-12-01 | Assigner GitHub_M




MEDIUM: 6.8CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

>= 15.0.0, < 15.86.0
affected

< 14.99.2
affected

References

github.com/...frappe/security/advisories/GHSA-v4wg-gqfr-rpjm

cve.org (CVE-2025-66206)

nvd.nist.gov (CVE-2025-66206)

Download JSON