Home

Description

ERPNext is a free and open source Enterprise Resource Planning tool. Prior to 15.106.0 and 16.16.0, a malicious user could send a crafted request to an endpoint, which would lead to the server making an HTTP call to a service of the user's choice. This vulnerability is fixed in 15.106.0 and 16.16.0.

PUBLISHED Reserved 2026-05-06 | Published 2026-05-13 | Updated 2026-05-14 | Assigner GitHub_M




MEDIUM: 5.0CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 15.106.0
affected

>= 16.0.0-beta.1, < 16.16.0
affected

References

github.com/...rpnext/security/advisories/GHSA-m4m4-j2m2-7fcw

cve.org (CVE-2026-44441)

nvd.nist.gov (CVE-2026-44441)

Download JSON