Description
Frappe is a full-stack web application framework. Prior to versions 14.94.3 and 15.58.0, a carefully crafted request could lead to a malicious actor getting access to a user's password reset token. This can only be exploited on self hosted instances configured in a certain way. Frappe Cloud users are safe. This issue has been patched in versions 14.94.3 and 15.58.0. Workarounds for this issue involve verifying password reset URLs before clicking on them or upgrading for self hosted users.
References (4)
Core 4
Core References
Vendor Advisory x_refsource_confirm
https://github.com/frappe/frappe/security/advisories/GHSA-p284-r7rh-wq7j
Issue Tracking x_refsource_misc
https://github.com/frappe/frappe/pull/31522
Patch x_refsource_misc
https://github.com/frappe/frappe/commit/52e31337a6c964189c8b883a2f7bc3a28ab374f2
Patch x_refsource_misc
https://github.com/frappe/frappe/commit/5b4849b1ab5fd796b306312745b4e202b0e90d66
Scores
CVSS v3
8.8
EPSS
0.0038
EPSS Percentile
59.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-200
Status
published
Products (1)
frappe/frappe
< 14.94.3
Published
Jun 30, 2025
Tracked Since
Feb 18, 2026