Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65267: n/a

0
Critical
VulnerabilityCVE-2025-65267cvecve-2025-65267
Published: Wed Dec 03 2025 (12/03/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

In ERPNext v15.83.2 and Frappe Framework v15.86.0, improper validation of uploaded SVG avatar images allows attackers to embed malicious JavaScript. The payload executes when an administrator clicks the image link to view the avatar, resulting in stored cross-site scripting (XSS). Successful exploitation may lead to account takeover, privilege escalation, or full compromise of the affected ERPNext instance.

AI-Powered Analysis

AILast updated: 12/03/2025, 15:23:32 UTC

Technical Analysis

The vulnerability identified as CVE-2025-65267 affects ERPNext version 15.83.2 and Frappe Framework version 15.86.0. It arises from improper validation of SVG avatar images uploaded by users. SVG files can contain embedded JavaScript, and in this case, the application fails to sanitize or restrict such content. When an attacker uploads a malicious SVG avatar, the embedded JavaScript executes in the context of the administrator's browser upon clicking the avatar image link to view it. This stored cross-site scripting (XSS) vulnerability enables attackers to perform actions such as stealing session cookies, executing arbitrary commands, escalating privileges, or even taking full control of the ERPNext instance. The attack vector requires an attacker to have the ability to upload avatar images, which may be restricted to authenticated users but could be exploited by insiders or through compromised accounts. The vulnerability impacts confidentiality by exposing sensitive session data, integrity by allowing unauthorized actions, and availability if the attacker disrupts services or locks out legitimate users. No CVSS score has been assigned yet, and no public exploits are currently known. However, the nature of stored XSS in an administrative context makes this a critical concern for organizations relying on ERPNext for business operations.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of ERP systems that manage critical business processes such as finance, supply chain, and human resources. Exploitation could lead to unauthorized access to sensitive corporate data, manipulation of business records, and disruption of operations. Given ERPNext's role in enterprise resource planning, a successful attack could result in financial losses, regulatory non-compliance, and reputational damage. Organizations with centralized administration and multiple users uploading avatars are particularly vulnerable. Additionally, the potential for privilege escalation means attackers could gain administrative control, further amplifying the impact. The threat is heightened in sectors with stringent data protection requirements under GDPR, where data breaches could lead to heavy fines. The lack of a patch at the time of disclosure increases the urgency for interim mitigations to prevent exploitation.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict avatar image upload permissions to the minimum necessary user roles, ideally disabling uploads for non-trusted users. Implement strict input validation and sanitization for SVG files, removing or disallowing any embedded scripts or potentially dangerous elements. Use content security policies (CSP) to limit the execution of inline scripts and reduce the impact of XSS attacks. Monitor and audit avatar uploads for suspicious files. Educate administrators to avoid clicking on untrusted avatar images until a patch is released. Once the vendor provides a security update or patch, apply it promptly. Additionally, consider isolating the ERPNext administrative interface behind VPNs or access controls to reduce exposure. Regularly review user privileges and session management to detect and respond to suspicious activities quickly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693052741f9e797ee291ba0c

Added to database: 12/3/2025, 3:08:36 PM

Last enriched: 12/3/2025, 3:23:32 PM

Last updated: 12/5/2025, 2:34:36 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats