Description
ERP is a free and open source Enterprise Resource Planning tool. In versions prior to 16.8.0 and 15.100.0, certain endpoints were vulnerable to time-based and boolean-based blind SQL injection due to insufficient parameter validation, allowing attackers to infer database information. This issue has been fixed in versions 15.100.0 and 16.8.0.
Published: 2026-03-20
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Information disclosure via blind SQL injection
Action: Patch Now
AI Analysis

Impact

Certain endpoints in the ERPNext application allow attackers to perform time‑based and boolean‑based blind SQL injection due to insufficient input validation. By sending crafted queries, an adversary can infer sensitive database contents without receiving direct responses. The principal consequence is the unintended disclosure of confidential data, which can lead to credential theft, corporate espionage, or further privilege escalation. The weakness aligns with CWE‑89, a classic injection flaw that enables data leakage and may serve as a foothold for additional attacks.

Affected Systems

The vulnerability affects the ERPNext platform, a free and open source enterprise resource planning system. Versions prior to 16.8.0 and 15.100.0 are identified as vulnerable. These versions were released before the patch that addressed the input‑validation flaw. System administrators managing older ERPNext deployments should verify the installed releases and confirm they are below the specified thresholds.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity, reflecting the potential for significant data exposure. The EPSS score of less than 1% suggests that, at present, exploitation is unlikely, and the vulnerability is not part of the recognized exploited catalog. Nonetheless, the ability to infer arbitrary database information presents a serious risk, especially in environments where ERPNext stores sensitive financial or HR data. Exploitation requires network access to the vulnerable endpoints and the ability to craft input strings, meaning that attackers can likely conduct the attack remotely without additional privileges.

Generated by OpenCVE AI on March 23, 2026 at 20:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ERPNext to version 15.100.0 or later; the issue is fixed starting in 15.100.0 and 16.8.0.
  • Verify that the system is running a patched release by checking the version number in the ERPNext application dashboard or via the command line.
  • If upgrading is not immediately possible, limit network exposure by restricting external access to the ERPNext endpoints and applying strict firewall rules.
  • Stay informed by monitoring the ERPNext security advisories page and review any additional patches or updates released by the community.

Generated by OpenCVE AI on March 23, 2026 at 20:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:frappe:erpnext:*:*:*:*:*:*:*:*

Fri, 20 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Frappe
Frappe erpnext
Vendors & Products Frappe
Frappe erpnext

Fri, 20 Mar 2026 04:45:00 +0000

Type Values Removed Values Added
Description ERP is a free and open source Enterprise Resource Planning tool. In versions prior to 16.8.0 and 15.100.0, certain endpoints were vulnerable to time-based and boolean-based blind SQL injection due to insufficient parameter validation, allowing attackers to infer database information. This issue has been fixed in versions 15.100.0 and 16.8.0.
Title ERP has a possibility SQL Injection vulnerability due to missing validation
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T14:27:42.195Z

Reserved: 2026-03-17T00:05:53.285Z

Link: CVE-2026-32954

cve-icon Vulnrichment

Updated: 2026-03-20T14:27:38.972Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T05:16:14.877

Modified: 2026-03-23T19:35:20.533

Link: CVE-2026-32954

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:09:19Z

Weaknesses