CVE-2023-46127

Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and an integrated client side library. A malicious Frappe user with desk access could create documents containing HTML payloads allowing HTML Injection. This vulnerability has been patched in version 14.49.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:27

Type Values Removed Values Added
References () https://github.com/frappe/frappe/commit/3dc5d2fcc7561dde181ba953009fe6e39d64e900 - Patch () https://github.com/frappe/frappe/commit/3dc5d2fcc7561dde181ba953009fe6e39d64e900 - Patch
References () https://github.com/frappe/frappe/pull/22339 - Release Notes () https://github.com/frappe/frappe/pull/22339 - Release Notes
References () https://github.com/frappe/frappe/security/advisories/GHSA-j2w9-8xrr-7g98 - Vendor Advisory () https://github.com/frappe/frappe/security/advisories/GHSA-j2w9-8xrr-7g98 - Vendor Advisory

31 Oct 2023, 12:17

Type Values Removed Values Added
First Time Frappe
Frappe frappe
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*
CWE CWE-79
References (MISC) https://github.com/frappe/frappe/pull/22339 - (MISC) https://github.com/frappe/frappe/pull/22339 - Release Notes
References (MISC) https://github.com/frappe/frappe/commit/3dc5d2fcc7561dde181ba953009fe6e39d64e900 - (MISC) https://github.com/frappe/frappe/commit/3dc5d2fcc7561dde181ba953009fe6e39d64e900 - Patch
References (MISC) https://github.com/frappe/frappe/security/advisories/GHSA-j2w9-8xrr-7g98 - (MISC) https://github.com/frappe/frappe/security/advisories/GHSA-j2w9-8xrr-7g98 - Vendor Advisory

23 Oct 2023, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-23 15:15

Updated : 2024-11-21 08:27


NVD link : CVE-2023-46127

Mitre link : CVE-2023-46127

CVE.ORG link : CVE-2023-46127


JSON object : View

Products Affected

frappe

  • frappe
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')