Skip to main content

CVE-2025-59421: CWE-770: Allocation of Resources Without Limits or Throttling in frappe press

Low
VulnerabilityCVE-2025-59421cvecve-2025-59421cwe-770
Published: Thu Sep 18 2025 (09/18/2025, 14:42:40 UTC)
Source: CVE Database V5
Vendor/Project: frappe
Product: press

Description

Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). A bad actor can flood the inbox of a user by repeatedly sending invites (duplicate). The issue is fixed in commit 83c3fc7676c5dbbe1fd5092d21d95a10c7b48615.

AI-Powered Analysis

AILast updated: 09/18/2025, 14:49:42 UTC

Technical Analysis

CVE-2025-59421 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without limits or throttling, found in the 'press' application, a custom app developed by Frappe that operates on Frappe Cloud. This application manages critical services such as infrastructure, subscriptions, marketplace, and SaaS offerings. The vulnerability allows an attacker to repeatedly send duplicate invites to a user, effectively flooding the user's inbox. This behavior can lead to a denial-of-service condition on the user level by overwhelming their messaging system, potentially causing disruption or annoyance. The vulnerability exists in versions of the 'press' app prior to the commit identified by hash 83c3fc7676c5dbbe1fd5092d21d95a10c7b48615, where the issue has been fixed. The CVSS 4.0 base score is 2.7, indicating a low severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and low impact on availability (VA:L) but no impact on confidentiality or integrity. There are no known exploits in the wild at this time. The vulnerability is essentially a resource exhaustion issue caused by the lack of throttling or limits on invite requests, which can be exploited remotely without authentication or user interaction.

Potential Impact

For European organizations using the Frappe 'press' application, this vulnerability could result in user inbox flooding, leading to potential operational disruptions, user frustration, and decreased productivity. While the direct impact on confidentiality and integrity is minimal, the availability of user communication channels could be impaired. This could be particularly problematic for organizations relying on Frappe Cloud services for critical SaaS infrastructure management, subscription handling, or marketplace operations. The low severity suggests limited risk of widespread damage; however, persistent exploitation could degrade user experience and trust in the platform. Additionally, if attackers combine this with social engineering or other attack vectors, it might facilitate further targeted attacks or phishing campaigns. The lack of known exploits reduces immediate risk, but organizations should remain vigilant given the ease of exploitation (no authentication or user interaction required).

Mitigation Recommendations

Organizations should ensure that their Frappe 'press' application is updated to the fixed version containing commit 83c3fc7676c5dbbe1fd5092d21d95a10c7b48615 or later. Beyond patching, administrators should implement rate limiting and throttling mechanisms on invite requests to prevent abuse. Monitoring and alerting on unusual spikes in invite activity can help detect exploitation attempts early. Additionally, applying email filtering and spam detection on user inboxes can mitigate the impact of flooding. Network-level protections such as Web Application Firewalls (WAFs) can be configured to detect and block repetitive invite requests from the same source. Finally, educating users about potential phishing or spam risks associated with unexpected invites can reduce the risk of secondary attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-15T19:13:16.904Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cc1bf715657adce9c5e0a3

Added to database: 9/18/2025, 2:49:27 PM

Last enriched: 9/18/2025, 2:49:42 PM

Last updated: 9/19/2025, 4:02:52 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats