CVE-2025-52049: n/a
In Frappe ErpNext v15.57.5, the function get_timesheet_detail_rate() at erpnext/projects/doctype/timesheet/timesheet.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting SQL query into the timelog parameter.
AI Analysis
Technical Summary
CVE-2025-52049 is a medium severity SQL Injection vulnerability identified in Frappe ErpNext version 15.57.5, specifically within the function get_timesheet_detail_rate() located in the erpnext/projects/doctype/timesheet/timesheet.py file. This vulnerability arises due to improper sanitization or validation of the 'timelog' parameter, which is used in constructing SQL queries. An attacker can exploit this flaw by injecting malicious SQL code into the 'timelog' parameter, enabling unauthorized extraction of sensitive information from the underlying database. The vulnerability does not require any authentication or user interaction, and it can be exploited remotely over the network (AV:N). The CVSS v3.1 base score is 6.5, reflecting a medium severity level, with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact primarily affects confidentiality and integrity, allowing data leakage and potential unauthorized data manipulation, but it does not affect availability. There are no known exploits in the wild at the time of publication, and no official patches have been linked yet. The vulnerability is classified under CWE-89, which corresponds to SQL Injection flaws. Given the critical role of ErpNext as an open-source ERP system widely used for business management, exploitation of this vulnerability could lead to significant data breaches and compromise of business operations.
Potential Impact
For European organizations utilizing Frappe ErpNext, this vulnerability poses a significant risk to the confidentiality and integrity of their business data, including sensitive project timesheets and potentially other linked database information. Unauthorized data extraction could lead to exposure of proprietary business information, employee data, and financial records, which could result in regulatory non-compliance under GDPR and other data protection laws. The integrity impact could allow attackers to manipulate timesheet data, potentially affecting payroll and project management accuracy. Although availability is not directly impacted, the breach of sensitive data could damage organizational reputation and trust. Given the remote exploitation capability without authentication, attackers could target exposed ErpNext instances, especially those accessible over the internet without adequate network protections. This vulnerability could also be leveraged as a foothold for further attacks within the corporate network.
Mitigation Recommendations
European organizations should immediately audit their use of Frappe ErpNext, specifically checking for version 15.57.5 or earlier versions that might be affected. Until an official patch is released, organizations should implement the following mitigations: 1) Restrict network access to ErpNext instances by enforcing strict firewall rules and VPN-only access to reduce exposure to the internet; 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'timelog' parameter; 3) Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries; 4) Monitor database query logs for unusual or suspicious activity indicative of injection attempts; 5) Regularly back up critical data and verify backup integrity to enable recovery in case of data manipulation; 6) Engage with the ErpNext community or vendor to track patch releases and apply updates promptly once available; 7) Consider deploying runtime application self-protection (RASP) tools to detect and block injection attacks in real time. These steps go beyond generic advice by focusing on immediate containment and proactive detection tailored to this specific vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-52049: n/a
Description
In Frappe ErpNext v15.57.5, the function get_timesheet_detail_rate() at erpnext/projects/doctype/timesheet/timesheet.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting SQL query into the timelog parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-52049 is a medium severity SQL Injection vulnerability identified in Frappe ErpNext version 15.57.5, specifically within the function get_timesheet_detail_rate() located in the erpnext/projects/doctype/timesheet/timesheet.py file. This vulnerability arises due to improper sanitization or validation of the 'timelog' parameter, which is used in constructing SQL queries. An attacker can exploit this flaw by injecting malicious SQL code into the 'timelog' parameter, enabling unauthorized extraction of sensitive information from the underlying database. The vulnerability does not require any authentication or user interaction, and it can be exploited remotely over the network (AV:N). The CVSS v3.1 base score is 6.5, reflecting a medium severity level, with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact primarily affects confidentiality and integrity, allowing data leakage and potential unauthorized data manipulation, but it does not affect availability. There are no known exploits in the wild at the time of publication, and no official patches have been linked yet. The vulnerability is classified under CWE-89, which corresponds to SQL Injection flaws. Given the critical role of ErpNext as an open-source ERP system widely used for business management, exploitation of this vulnerability could lead to significant data breaches and compromise of business operations.
Potential Impact
For European organizations utilizing Frappe ErpNext, this vulnerability poses a significant risk to the confidentiality and integrity of their business data, including sensitive project timesheets and potentially other linked database information. Unauthorized data extraction could lead to exposure of proprietary business information, employee data, and financial records, which could result in regulatory non-compliance under GDPR and other data protection laws. The integrity impact could allow attackers to manipulate timesheet data, potentially affecting payroll and project management accuracy. Although availability is not directly impacted, the breach of sensitive data could damage organizational reputation and trust. Given the remote exploitation capability without authentication, attackers could target exposed ErpNext instances, especially those accessible over the internet without adequate network protections. This vulnerability could also be leveraged as a foothold for further attacks within the corporate network.
Mitigation Recommendations
European organizations should immediately audit their use of Frappe ErpNext, specifically checking for version 15.57.5 or earlier versions that might be affected. Until an official patch is released, organizations should implement the following mitigations: 1) Restrict network access to ErpNext instances by enforcing strict firewall rules and VPN-only access to reduce exposure to the internet; 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'timelog' parameter; 3) Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries; 4) Monitor database query logs for unusual or suspicious activity indicative of injection attempts; 5) Regularly back up critical data and verify backup integrity to enable recovery in case of data manipulation; 6) Engage with the ErpNext community or vendor to track patch releases and apply updates promptly once available; 7) Consider deploying runtime application self-protection (RASP) tools to detect and block injection attacks in real time. These steps go beyond generic advice by focusing on immediate containment and proactive detection tailored to this specific vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68dc71325d588c52e5de4772
Added to database: 10/1/2025, 12:09:22 AM
Last enriched: 10/1/2025, 12:11:21 AM
Last updated: 1/7/2026, 5:23:03 AM
Views: 105
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.