Skip to main content

CVE-2025-52047: n/a

Medium
VulnerabilityCVE-2025-52047cvecve-2025-52047
Published: Tue Sep 30 2025 (09/30/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

In Frappe ErpNext v15.57.5, the function get_income_account() at erpnext/controllers/queries.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting a SQL query into the filters.disabled parameter.

AI-Powered Analysis

AILast updated: 09/30/2025, 14:08:50 UTC

Technical Analysis

CVE-2025-52047 is a SQL Injection vulnerability identified in Frappe ErpNext version 15.57.5, specifically within the function get_income_account() located in the erpnext/controllers/queries.py file. The vulnerability arises due to improper sanitization or validation of user input passed through the filters.disabled parameter, which is used in constructing SQL queries. An attacker can exploit this flaw by injecting malicious SQL code into the filters.disabled parameter, enabling them to manipulate the underlying database query. This manipulation can lead to unauthorized extraction of sensitive information from the database, potentially exposing all stored data. Since ErpNext is an open-source ERP system widely used for managing business processes such as accounting, inventory, and human resources, the exposure of its database could lead to significant data breaches including financial records, employee information, and operational data. The vulnerability does not currently have a CVSS score, and no public exploits have been reported yet. However, the nature of SQL Injection vulnerabilities inherently poses a high risk due to their potential for data exfiltration and system compromise. The lack of authentication requirements or user interaction details is not explicitly stated, but typically, such injection points in ERP query functions may be accessible via authenticated API calls or web interfaces, increasing the risk if access controls are weak or misconfigured. No official patches or mitigations have been linked yet, indicating that organizations using the affected version should prioritize investigation and protective measures.

Potential Impact

For European organizations, the impact of this vulnerability could be severe. ERP systems like ErpNext often contain critical business data, including financial transactions, customer details, supplier contracts, and employee records. Exploitation could lead to data breaches violating GDPR regulations, resulting in legal penalties and reputational damage. The ability to extract all database information could also facilitate further attacks such as identity theft, fraud, or corporate espionage. Additionally, compromised ERP systems might disrupt business operations, affecting supply chains and financial reporting. Given the stringent data protection laws in Europe and the increasing regulatory scrutiny, any data leakage from ERP platforms can have significant compliance and financial consequences. Organizations in sectors such as manufacturing, retail, and services that rely heavily on ERP solutions are particularly at risk. Furthermore, the exposure of sensitive financial data could attract attention from cybercriminal groups targeting European enterprises for financial gain or geopolitical motives.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify if they are running the affected version of Frappe ErpNext (v15.57.5). Immediate steps include: 1) Restricting access to the ERP system interfaces that accept the filters.disabled parameter, ensuring only trusted and authenticated users can interact with these endpoints. 2) Implementing Web Application Firewalls (WAFs) with SQL Injection detection and prevention rules tailored to detect anomalous input patterns targeting the filters.disabled parameter. 3) Conducting thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries, to prevent injection attacks. 4) Monitoring database query logs for unusual or suspicious queries that could indicate exploitation attempts. 5) Applying the principle of least privilege on database accounts used by the ERP application, limiting their ability to perform unauthorized data access or modifications. 6) Engaging with the ErpNext community or vendor for official patches or updates addressing this vulnerability and applying them promptly once available. 7) Performing regular security assessments and penetration testing focused on injection vulnerabilities within ERP modules. These measures combined will reduce the attack surface and help detect or prevent exploitation of this SQL Injection flaw.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68dbe4577491dc7f348b7539

Added to database: 9/30/2025, 2:08:23 PM

Last enriched: 9/30/2025, 2:08:50 PM

Last updated: 10/2/2025, 7:10:22 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats