Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10655: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Frappe Frappe HelpDesk

0
High
VulnerabilityCVE-2025-10655cvecve-2025-10655cwe-89
Published: Tue Dec 09 2025 (12/09/2025, 14:49:53 UTC)
Source: CVE Database V5
Vendor/Project: Frappe
Product: Frappe HelpDesk

Description

SQL Injection in Frappe HelpDesk in the dashboard get_dashboard_data due to unsafe concatenation of user-controlled parameters into dynamic SQL statements.This issue affects Frappe HelpDesk: 1.14.0.

AI-Powered Analysis

AILast updated: 12/09/2025, 15:12:08 UTC

Technical Analysis

CVE-2025-10655 is a critical SQL Injection vulnerability categorized under CWE-89, affecting Frappe HelpDesk version 1.14.0. The root cause is the unsafe concatenation of user-supplied input directly into dynamic SQL statements within the get_dashboard_data function of the dashboard module. This improper neutralization of special SQL elements allows attackers to inject malicious SQL code without authentication, exploiting the vulnerability remotely over the network. The CVSS 4.0 score of 8.6 reflects the high impact on confidentiality and integrity, as attackers can read, modify, or delete sensitive data stored in the backend database. The vulnerability does not require user interaction and has low attack complexity, making exploitation feasible for attackers with minimal privileges. Although no public exploits have been reported yet, the nature of SQL Injection vulnerabilities makes this a critical risk for organizations relying on this software. The lack of available patches at the time of reporting necessitates immediate attention to alternative mitigation strategies. The vulnerability could lead to data leakage, unauthorized data manipulation, or denial of service if exploited. Given Frappe HelpDesk's use in managing customer support and internal workflows, compromise could disrupt business operations and damage organizational reputation.

Potential Impact

For European organizations, exploitation of CVE-2025-10655 could result in significant data breaches involving customer support records, internal communications, and potentially sensitive business data. The confidentiality and integrity of databases may be compromised, leading to unauthorized data disclosure or manipulation. This could affect compliance with GDPR and other data protection regulations, resulting in legal and financial penalties. Operational disruptions may occur if attackers alter or delete critical data, impacting service availability indirectly. Organizations in sectors with high reliance on customer support platforms—such as finance, healthcare, and telecommunications—face elevated risks. The vulnerability's ease of exploitation and lack of authentication requirements increase the threat level, especially for organizations with internet-facing Frappe HelpDesk instances. Additionally, the reputational damage from a publicized breach could have long-term business consequences. The absence of known exploits in the wild currently provides a window for proactive defense, but the risk of future exploitation remains high.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting network access to the Frappe HelpDesk dashboard, limiting it to trusted internal networks or VPNs. 2. Implement strict input validation and sanitization on all user-supplied parameters, especially those used in SQL queries, to prevent injection of malicious code. 3. Employ parameterized queries or prepared statements in the application code to eliminate unsafe string concatenation in SQL commands. 4. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 5. Deploy Web Application Firewalls (WAFs) with rules targeting SQL Injection signatures to provide an additional layer of defense. 6. Engage with the Frappe vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 7. Conduct a thorough security review of all customizations or integrations with Frappe HelpDesk to identify and remediate similar coding practices. 8. Educate development and operations teams on secure coding practices related to database interactions. 9. Prepare incident response plans to quickly contain and remediate any exploitation attempts. 10. Regularly back up databases and verify the integrity of backups to enable recovery in case of data corruption or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Fluid Attacks
Date Reserved
2025-09-17T19:31:22.120Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69383abe29cea75c35b76e65

Added to database: 12/9/2025, 3:05:34 PM

Last enriched: 12/9/2025, 3:12:08 PM

Last updated: 12/11/2025, 6:55:36 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats