CVE-2025-66206

Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, certain requests were vulnerable to path traversal attacks, wherein some files from the server could be retrieved if the full path was known. Sites hosted on Frappe Cloud, and even other setups that are behind a reverse proxy like NGINX are unaffected. This would mainly affect someone directly using werkzeug/gunicorn. In those cases, either an upgrade or changing the setup to use a reverse proxy is recommended. This vulnerability is fixed in 15.86.0 and 14.99.2.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*
cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-12-01 21:15

Updated : 2025-12-04 18:41


NVD link : CVE-2025-66206

Mitre link : CVE-2025-66206

CVE.ORG link : CVE-2025-66206


JSON object : View

Products Affected

frappe

  • frappe
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')