CVE-2025-59421: CWE-770: Allocation of Resources Without Limits or Throttling in frappe press
Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). A bad actor can flood the inbox of a user by repeatedly sending invites (duplicate). The issue is fixed in commit 83c3fc7676c5dbbe1fd5092d21d95a10c7b48615.
AI Analysis
Technical Summary
CVE-2025-59421 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without limits or throttling, found in the 'press' application, a custom app developed by Frappe that operates on Frappe Cloud. This application manages critical services such as infrastructure, subscriptions, marketplace, and SaaS offerings. The vulnerability allows an attacker to repeatedly send duplicate invites to a user, effectively flooding the user's inbox. This behavior can lead to a denial-of-service condition on the user level by overwhelming their messaging system, potentially causing disruption or annoyance. The vulnerability exists in versions of the 'press' app prior to the commit identified by hash 83c3fc7676c5dbbe1fd5092d21d95a10c7b48615, where the issue has been fixed. The CVSS 4.0 base score is 2.7, indicating a low severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and low impact on availability (VA:L) but no impact on confidentiality or integrity. There are no known exploits in the wild at this time. The vulnerability is essentially a resource exhaustion issue caused by the lack of throttling or limits on invite requests, which can be exploited remotely without authentication or user interaction.
Potential Impact
For European organizations using the Frappe 'press' application, this vulnerability could result in user inbox flooding, leading to potential operational disruptions, user frustration, and decreased productivity. While the direct impact on confidentiality and integrity is minimal, the availability of user communication channels could be impaired. This could be particularly problematic for organizations relying on Frappe Cloud services for critical SaaS infrastructure management, subscription handling, or marketplace operations. The low severity suggests limited risk of widespread damage; however, persistent exploitation could degrade user experience and trust in the platform. Additionally, if attackers combine this with social engineering or other attack vectors, it might facilitate further targeted attacks or phishing campaigns. The lack of known exploits reduces immediate risk, but organizations should remain vigilant given the ease of exploitation (no authentication or user interaction required).
Mitigation Recommendations
Organizations should ensure that their Frappe 'press' application is updated to the fixed version containing commit 83c3fc7676c5dbbe1fd5092d21d95a10c7b48615 or later. Beyond patching, administrators should implement rate limiting and throttling mechanisms on invite requests to prevent abuse. Monitoring and alerting on unusual spikes in invite activity can help detect exploitation attempts early. Additionally, applying email filtering and spam detection on user inboxes can mitigate the impact of flooding. Network-level protections such as Web Application Firewalls (WAFs) can be configured to detect and block repetitive invite requests from the same source. Finally, educating users about potential phishing or spam risks associated with unexpected invites can reduce the risk of secondary attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-59421: CWE-770: Allocation of Resources Without Limits or Throttling in frappe press
Description
Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). A bad actor can flood the inbox of a user by repeatedly sending invites (duplicate). The issue is fixed in commit 83c3fc7676c5dbbe1fd5092d21d95a10c7b48615.
AI-Powered Analysis
Technical Analysis
CVE-2025-59421 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without limits or throttling, found in the 'press' application, a custom app developed by Frappe that operates on Frappe Cloud. This application manages critical services such as infrastructure, subscriptions, marketplace, and SaaS offerings. The vulnerability allows an attacker to repeatedly send duplicate invites to a user, effectively flooding the user's inbox. This behavior can lead to a denial-of-service condition on the user level by overwhelming their messaging system, potentially causing disruption or annoyance. The vulnerability exists in versions of the 'press' app prior to the commit identified by hash 83c3fc7676c5dbbe1fd5092d21d95a10c7b48615, where the issue has been fixed. The CVSS 4.0 base score is 2.7, indicating a low severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and low impact on availability (VA:L) but no impact on confidentiality or integrity. There are no known exploits in the wild at this time. The vulnerability is essentially a resource exhaustion issue caused by the lack of throttling or limits on invite requests, which can be exploited remotely without authentication or user interaction.
Potential Impact
For European organizations using the Frappe 'press' application, this vulnerability could result in user inbox flooding, leading to potential operational disruptions, user frustration, and decreased productivity. While the direct impact on confidentiality and integrity is minimal, the availability of user communication channels could be impaired. This could be particularly problematic for organizations relying on Frappe Cloud services for critical SaaS infrastructure management, subscription handling, or marketplace operations. The low severity suggests limited risk of widespread damage; however, persistent exploitation could degrade user experience and trust in the platform. Additionally, if attackers combine this with social engineering or other attack vectors, it might facilitate further targeted attacks or phishing campaigns. The lack of known exploits reduces immediate risk, but organizations should remain vigilant given the ease of exploitation (no authentication or user interaction required).
Mitigation Recommendations
Organizations should ensure that their Frappe 'press' application is updated to the fixed version containing commit 83c3fc7676c5dbbe1fd5092d21d95a10c7b48615 or later. Beyond patching, administrators should implement rate limiting and throttling mechanisms on invite requests to prevent abuse. Monitoring and alerting on unusual spikes in invite activity can help detect exploitation attempts early. Additionally, applying email filtering and spam detection on user inboxes can mitigate the impact of flooding. Network-level protections such as Web Application Firewalls (WAFs) can be configured to detect and block repetitive invite requests from the same source. Finally, educating users about potential phishing or spam risks associated with unexpected invites can reduce the risk of secondary attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-15T19:13:16.904Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cc1bf715657adce9c5e0a3
Added to database: 9/18/2025, 2:49:27 PM
Last enriched: 9/18/2025, 2:49:42 PM
Last updated: 9/19/2025, 4:02:52 AM
Views: 8
Related Threats
CVE-2025-9969: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Vizly Web Design Real Estate Packages
HighCVE-2025-10468: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Beyaz Computer CityPlus
HighCVE-2025-10719: CWE-639 Authorization Bypass Through User-Controlled Key in WisdomGarden Tronclass
MediumCVE-2025-8531: CWE-130 Improper Handling of Length Parameter Inconsistency in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU
MediumCVE-2025-9906: CWE-502 Deserialization of Untrusted Data in Keras-team Keras
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.