Impact
The vulnerability is a sandbox escape in the RestrictedPython engine of Frappe Framework (ERPNext) 13.4.0. It enables an authenticated user with the System Manager role to execute arbitrary code. The flaw is classified as CWE‑94, arising from unsafe evaluation of user‑supplied script code that can be leveraged to circumvent the provided execution sandbox.
Affected Systems
Affected products are ERPNext (Frappe Framework) version 13.4.0. Only this specific release is listed as vulnerable; no other product variants or versions are explicitly mentioned.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity. Exploitation requires authenticated access and the ability to create a server script via the /app/server-script endpoint. Attackers can use the gi_frame attribute to traverse the call stack and invoke os.popen, thereby executing arbitrary system commands. The EPSS is not available and the vulnerability is not listed in CISA’s KEV catalog, but the impact is clear and the exploit path remains viable for any system exposed to System Manager traffic.
OpenCVE Enrichment