Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65267: n/a

0
Critical
VulnerabilityCVE-2025-65267cvecve-2025-65267
Published: Wed Dec 03 2025 (12/03/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65267 is a critical stored cross-site scripting (XSS) vulnerability in ERPNext v15. 83. 2 and Frappe Framework v15. 86. 0. It arises from improper validation of uploaded SVG avatar images, allowing attackers to embed malicious JavaScript. The payload executes when an administrator clicks the avatar image link, potentially leading to account takeover, privilege escalation, or full system compromise. The vulnerability requires low attack complexity but does need some privileges and user interaction. Exploitation impacts confidentiality, integrity, and availability of the ERP system. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 12/10/2025, 15:59:44 UTC

Technical Analysis

CVE-2025-65267 is a critical stored cross-site scripting (XSS) vulnerability identified in ERPNext version 15.83.2 and Frappe Framework version 15.86.0. The root cause is improper validation of SVG avatar image uploads, which allows attackers to embed malicious JavaScript code within these SVG files. When an administrator user clicks on the avatar image link to view it, the embedded script executes in the context of the administrator's session. This stored XSS can lead to severe consequences including account takeover, privilege escalation, and potentially full compromise of the ERPNext instance. The vulnerability leverages the SVG format's capability to contain script elements, which were not properly sanitized or restricted by the application. The CVSS v3.1 score is 9.0 (critical), reflecting network attack vector, low attack complexity, required privileges (administrator-level), user interaction (clicking the image), and a scope change affecting confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the severity and ease of exploitation by an authenticated attacker make this a significant threat. ERPNext is widely used for enterprise resource planning, making this vulnerability particularly impactful for organizations relying on it for business-critical functions. The CWE-79 classification confirms this is a classic XSS vulnerability. The lack of current patches necessitates immediate interim mitigations to prevent exploitation.

Potential Impact

For European organizations, the impact of CVE-2025-65267 is substantial. ERPNext is used by many small to medium enterprises and some larger organizations across Europe for managing financials, inventory, HR, and other critical business processes. Exploitation could allow attackers to hijack administrator sessions, manipulate sensitive business data, escalate privileges, and potentially disrupt operations. This can lead to financial losses, regulatory non-compliance (especially under GDPR due to data breaches), reputational damage, and operational downtime. Given the critical nature of ERP systems, a full compromise could also serve as a foothold for lateral movement within corporate networks, increasing the risk of broader cyberattacks. The requirement for administrator interaction limits mass exploitation but targeted attacks against high-value organizations remain a serious concern. The absence of known exploits currently provides a window for proactive defense, but the critical CVSS score demands urgent attention.

Mitigation Recommendations

1. Immediately restrict or disable SVG avatar image uploads until a patch is available. 2. Implement server-side SVG sanitization using robust libraries that remove script elements and potentially dangerous attributes before accepting uploads. 3. Enforce strict Content Security Policy (CSP) headers to limit script execution contexts, especially for administrator interfaces. 4. Educate administrators to avoid clicking on untrusted or unexpected avatar image links. 5. Monitor logs for suspicious avatar upload activity and administrator interactions with avatar images. 6. Apply principle of least privilege to administrator accounts to reduce risk if compromised. 7. Stay alert for official patches or updates from ERPNext and Frappe Framework and apply them promptly once released. 8. Consider additional network segmentation and monitoring around ERPNext instances to detect and contain potential exploitation attempts. 9. Conduct internal security reviews and penetration testing focusing on input validation and XSS vectors within ERPNext deployments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693052741f9e797ee291ba0c

Added to database: 12/3/2025, 3:08:36 PM

Last enriched: 12/10/2025, 3:59:44 PM

Last updated: 1/19/2026, 2:45:13 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats