Description
Frappe is a full-stack web application framework. Prior to versions 14.100.1 and 15.100.0, an endpoint was vulnerable to SQL injection through specially crafted requests, which would allow a malicious actor to extract sensitive information. This issue has been patched in versions 14.100.1 and 15.100.0.
Published: 2026-03-05
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Apply Patch
AI Analysis

Impact

An endpoint in Frappe versions prior to 14.100.1 and 15.100.0 allows maliciously crafted requests to perform SQL injection, potentially enabling attackers to read or manipulate database contents. The flaw arises from inadequate sanitization of field names supplied by the user. This weakness (CWE‑89) can lead to the disclosure of sensitive data, violating confidentiality, and may be a first step toward further exploitation if additional vulnerabilities exist. The problem is confined to the specific endpoint and does not grant system‑wide privileges by itself, but the impact depends on the data accessible through the database.

Affected Systems

The vulnerable product is the Frappe framework, available under the frappe:frappe umbrella. All releases before version 14.100.1 of the 14.x series and before 15.100.0 of the 15.x series are impacted. Deployments using these versions should immediately consider an upgrade.

Risk and Exploitability

The CVSS score of 6.5 classifies the vulnerability as Medium severity. The EPSS score is below 1 %, indicating that exploitation likelihood is low, and the vulnerability is not currently listed in the CISA KEV catalog. Attackers would need to send crafted requests to the vulnerable endpoint, typically over HTTP(S), and would require network access to the application instance. While the risk is moderate, organizations running affected Frappe instances should treat the issue with urgency because the data at risk may be highly sensitive.

Generated by OpenCVE AI on April 16, 2026 at 12:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Frappe framework to version 14.100.1 or newer, or to version 15.100.0 or newer, which contain the fix for the injection flaw.
  • If an upgrade cannot be performed immediately, restrict network access to the vulnerable endpoint or disable it entirely to prevent exposed injection points.
  • Implement server‑side input validation and sanitization for all incoming field names in accordance with OWASP GUIDELINES to mitigate similar injection weaknesses.

Generated by OpenCVE AI on April 16, 2026 at 12:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*

Sat, 07 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Frappe
Frappe frappe
Vendors & Products Frappe
Frappe frappe

Thu, 05 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Description Frappe is a full-stack web application framework. Prior to versions 14.100.1 and 15.100.0, an endpoint was vulnerable to SQL injection through specially crafted requests, which would allow a malicious actor to extract sensitive information. This issue has been patched in versions 14.100.1 and 15.100.0.
Title Frappe: Possibility of SQL Injection due to improper fieldname sanitization
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-06T17:02:00.462Z

Reserved: 2026-03-03T20:51:43.483Z

Link: CVE-2026-29081

cve-icon Vulnrichment

Updated: 2026-03-06T17:01:56.754Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T21:16:22.947

Modified: 2026-03-09T18:44:27.460

Link: CVE-2026-29081

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:15:35Z

Weaknesses