Home
MEDIUM: 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N < 15.106.0
affected
>= 16.0.0-beta.1, < 16.16.0
affected
Description
ERPNext is a free and open source Enterprise Resource Planning tool. Prior to 15.106.0 and 16.16.0, a malicious user could send a crafted request to an endpoint, which would lead to the server making an HTTP call to a service of the user's choice. This vulnerability is fixed in 15.106.0 and 16.16.0.
Problem types
CWE-918: Server-Side Request Forgery (SSRF)
Product status
>= 16.0.0-beta.1, < 16.16.0
References
github.com/...rpnext/security/advisories/GHSA-m4m4-j2m2-7fcw