CVE-2025-52049: n/a
In Frappe ErpNext v15.57.5, the function get_timesheet_detail_rate() at erpnext/projects/doctype/timesheet/timesheet.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting SQL query into the timelog parameter.
AI Analysis
Technical Summary
CVE-2025-52049 is a medium severity SQL Injection vulnerability identified in Frappe ErpNext version 15.57.5, specifically within the function get_timesheet_detail_rate() located in the erpnext/projects/doctype/timesheet/timesheet.py file. This vulnerability arises due to improper sanitization or validation of the 'timelog' parameter, which is used in constructing SQL queries. An attacker can exploit this flaw by injecting malicious SQL code into the 'timelog' parameter, enabling unauthorized extraction of sensitive information from the underlying database. The vulnerability does not require any authentication or user interaction, and it can be exploited remotely over the network (AV:N). The CVSS v3.1 base score is 6.5, reflecting a medium severity level, with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact primarily affects confidentiality and integrity, allowing data leakage and potential unauthorized data manipulation, but it does not affect availability. There are no known exploits in the wild at the time of publication, and no official patches have been linked yet. The vulnerability is classified under CWE-89, which corresponds to SQL Injection flaws. Given the critical role of ErpNext as an open-source ERP system widely used for business management, exploitation of this vulnerability could lead to significant data breaches and compromise of business operations.
Potential Impact
For European organizations utilizing Frappe ErpNext, this vulnerability poses a significant risk to the confidentiality and integrity of their business data, including sensitive project timesheets and potentially other linked database information. Unauthorized data extraction could lead to exposure of proprietary business information, employee data, and financial records, which could result in regulatory non-compliance under GDPR and other data protection laws. The integrity impact could allow attackers to manipulate timesheet data, potentially affecting payroll and project management accuracy. Although availability is not directly impacted, the breach of sensitive data could damage organizational reputation and trust. Given the remote exploitation capability without authentication, attackers could target exposed ErpNext instances, especially those accessible over the internet without adequate network protections. This vulnerability could also be leveraged as a foothold for further attacks within the corporate network.
Mitigation Recommendations
European organizations should immediately audit their use of Frappe ErpNext, specifically checking for version 15.57.5 or earlier versions that might be affected. Until an official patch is released, organizations should implement the following mitigations: 1) Restrict network access to ErpNext instances by enforcing strict firewall rules and VPN-only access to reduce exposure to the internet; 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'timelog' parameter; 3) Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries; 4) Monitor database query logs for unusual or suspicious activity indicative of injection attempts; 5) Regularly back up critical data and verify backup integrity to enable recovery in case of data manipulation; 6) Engage with the ErpNext community or vendor to track patch releases and apply updates promptly once available; 7) Consider deploying runtime application self-protection (RASP) tools to detect and block injection attacks in real time. These steps go beyond generic advice by focusing on immediate containment and proactive detection tailored to this specific vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-52049: n/a
Description
In Frappe ErpNext v15.57.5, the function get_timesheet_detail_rate() at erpnext/projects/doctype/timesheet/timesheet.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting SQL query into the timelog parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-52049 is a medium severity SQL Injection vulnerability identified in Frappe ErpNext version 15.57.5, specifically within the function get_timesheet_detail_rate() located in the erpnext/projects/doctype/timesheet/timesheet.py file. This vulnerability arises due to improper sanitization or validation of the 'timelog' parameter, which is used in constructing SQL queries. An attacker can exploit this flaw by injecting malicious SQL code into the 'timelog' parameter, enabling unauthorized extraction of sensitive information from the underlying database. The vulnerability does not require any authentication or user interaction, and it can be exploited remotely over the network (AV:N). The CVSS v3.1 base score is 6.5, reflecting a medium severity level, with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact primarily affects confidentiality and integrity, allowing data leakage and potential unauthorized data manipulation, but it does not affect availability. There are no known exploits in the wild at the time of publication, and no official patches have been linked yet. The vulnerability is classified under CWE-89, which corresponds to SQL Injection flaws. Given the critical role of ErpNext as an open-source ERP system widely used for business management, exploitation of this vulnerability could lead to significant data breaches and compromise of business operations.
Potential Impact
For European organizations utilizing Frappe ErpNext, this vulnerability poses a significant risk to the confidentiality and integrity of their business data, including sensitive project timesheets and potentially other linked database information. Unauthorized data extraction could lead to exposure of proprietary business information, employee data, and financial records, which could result in regulatory non-compliance under GDPR and other data protection laws. The integrity impact could allow attackers to manipulate timesheet data, potentially affecting payroll and project management accuracy. Although availability is not directly impacted, the breach of sensitive data could damage organizational reputation and trust. Given the remote exploitation capability without authentication, attackers could target exposed ErpNext instances, especially those accessible over the internet without adequate network protections. This vulnerability could also be leveraged as a foothold for further attacks within the corporate network.
Mitigation Recommendations
European organizations should immediately audit their use of Frappe ErpNext, specifically checking for version 15.57.5 or earlier versions that might be affected. Until an official patch is released, organizations should implement the following mitigations: 1) Restrict network access to ErpNext instances by enforcing strict firewall rules and VPN-only access to reduce exposure to the internet; 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'timelog' parameter; 3) Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries; 4) Monitor database query logs for unusual or suspicious activity indicative of injection attempts; 5) Regularly back up critical data and verify backup integrity to enable recovery in case of data manipulation; 6) Engage with the ErpNext community or vendor to track patch releases and apply updates promptly once available; 7) Consider deploying runtime application self-protection (RASP) tools to detect and block injection attacks in real time. These steps go beyond generic advice by focusing on immediate containment and proactive detection tailored to this specific vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68dc71325d588c52e5de4772
Added to database: 10/1/2025, 12:09:22 AM
Last enriched: 10/1/2025, 12:11:21 AM
Last updated: 10/1/2025, 3:25:35 AM
Views: 4
Related Threats
CVE-2025-10847: Vulnerability in Broadcom Unified Infrastructure Management
HighCVE-2025-9512: CWE-79 Cross-Site Scripting (XSS) in Schema & Structured Data for WP & AMP
HighCVE-2025-10538: CWE-288: Authentication Bypass Using an Alternate Path or Channel in LG Innotek Camera Model LND7210
HighCVE-2025-9075: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bdthemes ZoloBlocks – Gutenberg Block Editor Plugin with Advanced Blocks, Dynamic Content, Templates & Patterns
MediumCVE-2025-10744: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in softdiscover File Manager, Code Editor, and Backup by Managefy
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.