CVE-2025-52050: n/a
In Frappe ERPNext 15.57.5, the function get_loyalty_program_details_with_points() at erpnext/accounts/doctype/loyalty_program/loyalty_program.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting a SQL query into the expiry_date parameter.
AI Analysis
Technical Summary
CVE-2025-52050 is a medium-severity SQL Injection vulnerability identified in Frappe ERPNext version 15.57.5, specifically within the function get_loyalty_program_details_with_points() located in the file erpnext/accounts/doctype/loyalty_program/loyalty_program.py. The vulnerability arises because the expiry_date parameter is not properly sanitized or validated before being incorporated into an SQL query. This flaw allows an unauthenticated attacker to inject arbitrary SQL code via the expiry_date parameter, potentially enabling them to extract sensitive information from the underlying database. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), which is a common and critical class of injection flaws. According to the CVSS v3.1 scoring, the vulnerability has a base score of 6.5, indicating medium severity. The vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N indicates that the attack can be performed remotely over the network without any privileges or user interaction, affecting confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow attackers to extract confidential data from ERPNext databases, which often contain sensitive business and financial information, loyalty program details, and customer data. Given ERPNext's role as an open-source ERP system widely used by small to medium enterprises, this vulnerability poses a significant risk if left unmitigated.
Potential Impact
For European organizations using ERPNext, this vulnerability could lead to unauthorized disclosure of sensitive business data, including customer loyalty program details and potentially broader financial or operational information stored within the ERP system. The confidentiality breach could result in loss of customer trust, regulatory non-compliance (e.g., GDPR violations due to exposure of personal data), and financial damage. Since ERPNext is often used by SMEs across Europe, the impact could be widespread, especially for companies that rely heavily on loyalty programs and customer relationship management. The integrity impact, while rated low, could still allow attackers to manipulate data queries, potentially leading to inaccurate reporting or business decisions. The lack of required authentication and user interaction makes exploitation easier, increasing the risk of automated attacks. Although availability is not impacted, the breach of confidentiality and integrity alone can have serious operational and reputational consequences for European businesses.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately review and restrict access to ERPNext instances, especially those exposed to the internet. Network-level protections such as Web Application Firewalls (WAFs) should be configured to detect and block SQL injection patterns targeting the expiry_date parameter. Organizations should audit their ERPNext installations and apply any available patches or updates from the vendor as soon as they are released. In the absence of official patches, temporary mitigations include implementing input validation and sanitization on the expiry_date parameter, using parameterized queries or prepared statements in the codebase, and restricting database user permissions to minimize data exposure. Regular security assessments and penetration testing focused on injection vulnerabilities should be conducted. Additionally, monitoring database query logs for unusual or suspicious activity related to loyalty program queries can help detect exploitation attempts early. Finally, organizations should ensure compliance with data protection regulations by preparing incident response plans in case of data breaches.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-52050: n/a
Description
In Frappe ERPNext 15.57.5, the function get_loyalty_program_details_with_points() at erpnext/accounts/doctype/loyalty_program/loyalty_program.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting a SQL query into the expiry_date parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-52050 is a medium-severity SQL Injection vulnerability identified in Frappe ERPNext version 15.57.5, specifically within the function get_loyalty_program_details_with_points() located in the file erpnext/accounts/doctype/loyalty_program/loyalty_program.py. The vulnerability arises because the expiry_date parameter is not properly sanitized or validated before being incorporated into an SQL query. This flaw allows an unauthenticated attacker to inject arbitrary SQL code via the expiry_date parameter, potentially enabling them to extract sensitive information from the underlying database. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), which is a common and critical class of injection flaws. According to the CVSS v3.1 scoring, the vulnerability has a base score of 6.5, indicating medium severity. The vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N indicates that the attack can be performed remotely over the network without any privileges or user interaction, affecting confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow attackers to extract confidential data from ERPNext databases, which often contain sensitive business and financial information, loyalty program details, and customer data. Given ERPNext's role as an open-source ERP system widely used by small to medium enterprises, this vulnerability poses a significant risk if left unmitigated.
Potential Impact
For European organizations using ERPNext, this vulnerability could lead to unauthorized disclosure of sensitive business data, including customer loyalty program details and potentially broader financial or operational information stored within the ERP system. The confidentiality breach could result in loss of customer trust, regulatory non-compliance (e.g., GDPR violations due to exposure of personal data), and financial damage. Since ERPNext is often used by SMEs across Europe, the impact could be widespread, especially for companies that rely heavily on loyalty programs and customer relationship management. The integrity impact, while rated low, could still allow attackers to manipulate data queries, potentially leading to inaccurate reporting or business decisions. The lack of required authentication and user interaction makes exploitation easier, increasing the risk of automated attacks. Although availability is not impacted, the breach of confidentiality and integrity alone can have serious operational and reputational consequences for European businesses.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately review and restrict access to ERPNext instances, especially those exposed to the internet. Network-level protections such as Web Application Firewalls (WAFs) should be configured to detect and block SQL injection patterns targeting the expiry_date parameter. Organizations should audit their ERPNext installations and apply any available patches or updates from the vendor as soon as they are released. In the absence of official patches, temporary mitigations include implementing input validation and sanitization on the expiry_date parameter, using parameterized queries or prepared statements in the codebase, and restricting database user permissions to minimize data exposure. Regular security assessments and penetration testing focused on injection vulnerabilities should be conducted. Additionally, monitoring database query logs for unusual or suspicious activity related to loyalty program queries can help detect exploitation attempts early. Finally, organizations should ensure compliance with data protection regulations by preparing incident response plans in case of data breaches.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68dc71325d588c52e5de476e
Added to database: 10/1/2025, 12:09:22 AM
Last enriched: 10/1/2025, 12:11:06 AM
Last updated: 10/2/2025, 12:10:59 AM
Views: 5
Related Threats
CVE-2025-11221: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in GTONE ChangeFlow
CriticalCVE-2025-11182: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in GTONE ChangeFlow
HighCVE-2025-11020: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in MarkAny SafePC Enterprise
HighCVE-2025-61855
LowCVE-2025-61854
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.