Description
A Server-Side Request Forgery (SSRF) vulnerability exists in the Print Format functionality of ERPNext v16.0.1 and Frappe Framework v16.1.1, where user-supplied HTML is insufficiently sanitized before being rendered into PDF. When generating PDFs from user-controlled HTML content, the application allows the inclusion of HTML elements such as <iframe> that reference external resources. The PDF rendering engine automatically fetches these resources on the server side. An attacker can abuse this behavior to force the server to make arbitrary HTTP requests to internal services, including cloud metadata endpoints, potentially leading to sensitive information disclosure.
Published: 2026-04-08
Score: n/a
EPSS: n/a
KEV: No
Impact: Server‑Side Request Forgery enabling internal resource access
Action: Apply Patch
AI Analysis

Impact

This vulnerability permits a remote attacker to inject user‑controlled HTML containing elements such as <iframe> into the Print Format feature of ERPNext v16.0.1 and Frappe Framework v16.1.1. When a PDF is generated, the rendering engine fetches referenced resources server‑side, enabling the attacker to force the server to request arbitrary URLs, including internal services and cloud metadata endpoints. The results can be the disclosure of sensitive data such as internal IPs, configuration secrets, or role information, and can compromise overall confidentiality.

Affected Systems

ERPNext v16.0.1 and Frappe Framework v16.1.1, when using the Print Format PDF generation feature, are affected. No other versions are known to be impacted.

Risk and Exploitability

The CVSS score is not provided; however, the impact potential is high because an attacker can reach services not exposed externally. The EPSS score is unavailable and the vulnerability is not listed in the KEV catalog, suggesting no confirmed active exploitation yet. The attack vector is likely through a crafted print format that the user submits via the web interface, with no special privileges required beyond legitimate user access. If exploited, the server can internally request any network resource, which may lead to information disclosure or further lateral movement.

Generated by OpenCVE AI on April 8, 2026 at 18:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch or upgrade ERPNext to a version where Print Format PDF sanitization is fixed
  • Restrict outbound HTTP connections from the ERPNext server to internal networks or cloud metadata endpoints
  • Sanitize or whitelist user‑supplied HTML before PDF rendering as an interim measure
  • Monitor server logs for unexpected outbound HTTP requests

Generated by OpenCVE AI on April 8, 2026 at 18:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Frappe
Frappe erpnext
Frappe framework
Vendors & Products Frappe
Frappe erpnext
Frappe framework

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title SSRF in ERPNext PDF Rendering Allows Server‑Side Requests
Weaknesses CWE-918

Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Description A Server-Side Request Forgery (SSRF) vulnerability exists in the Print Format functionality of ERPNext v16.0.1 and Frappe Framework v16.1.1, where user-supplied HTML is insufficiently sanitized before being rendered into PDF. When generating PDFs from user-controlled HTML content, the application allows the inclusion of HTML elements such as <iframe> that reference external resources. The PDF rendering engine automatically fetches these resources on the server side. An attacker can abuse this behavior to force the server to make arbitrary HTTP requests to internal services, including cloud metadata endpoints, potentially leading to sensitive information disclosure.
References

Subscriptions

Frappe Erpnext Framework
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-08T16:25:25.861Z

Reserved: 2026-03-09T00:00:00.000Z

Link: CVE-2026-31017

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T17:21:18.737

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-31017

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:22:47Z

Weaknesses