An issue was discovered in Frappe ERPNext through 15.89.0. Function get_outstanding_reference_documents() at erpnext.accounts.doctype.payment_entry.payment_entry.py is vulnerable to SQL Injection. It allows an attacker to extract arbitrary data from the database by injecting SQL payloads via the from_posting_date parameter, which is directly interpolated into the query without proper sanitization or parameter binding.
References
| Link | Resource |
|---|---|
| https://github.com/frappe/frappe/security | Product |
| https://iamanc.github.io/post/erpnext-sqli | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-15 18:15
Updated : 2026-01-05 18:21
NVD link : CVE-2025-66439
Mitre link : CVE-2025-66439
CVE.ORG link : CVE-2025-66439
JSON object : View
Products Affected
frappe
- erpnext
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
