Impact
The vulnerability allows any authenticated user in the Frappe framework to craft a request to a specific endpoint, causing the server to make an outbound HTTP request to a service selected by the attacker. This Server Side Request Forgery (SSRF) can expose internal network resources or leak sensitive data. The weakness corresponds to CWE-918, indicating a failure to properly validate destination URLs. Based on the description, it is inferred that the attacker could use the SSRF to reach internal services and potentially pivot to further attacks such as data exfiltration.
Affected Systems
Affected products are the Frappe framework (vendor: frappe). Versions prior to 14.100.1, 15.100.0, and 16.6.0 are vulnerable. The issue is fixed in versions 14.100.1 and newer, 15.100.0 and newer, and 16.6.0 and newer.
Risk and Exploitability
The CVSS score is 5, indicating medium severity, while the EPSS score is below 1%, suggesting that exploitation is currently unlikely. The vulnerability is not listed in the CISA KEV catalog. The vulnerability requires authenticated access to the application; based on the description, it is inferred that an attacker must first compromise user credentials or otherwise gain legitimate user access. No public exploits were reported at the time of the advisory. Given the medium severity and low exploitation probability, risk remains moderate but should be addressed promptly to prevent potential internal network exposure.
OpenCVE Enrichment