Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65923: n/a

0
Medium
VulnerabilityCVE-2025-65923cvecve-2025-65923
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65923 is a stored Cross-Site Scripting (XSS) vulnerability in ERPNext's CSV import feature when using the 'Update Existing Records' option. An attacker can inject malicious JavaScript into CSV fields, which is then stored and executed in the web interface when a user views the affected record. This can lead to session hijacking or unauthorized actions under the victim's account context. The vulnerability requires low privileges but does require user interaction to trigger. It has a CVSS score of 5. 4 (medium severity). No known exploits are reported in the wild yet. Organizations using ERPNext should be cautious when importing CSV data and apply appropriate input validation and sanitization controls. This vulnerability primarily impacts confidentiality and integrity but not availability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 12:04:40 UTC

Technical Analysis

CVE-2025-65923 is a stored Cross-Site Scripting (XSS) vulnerability identified in ERPNext versions up to 15.88.1, specifically affecting the CSV import mechanism when the 'Update Existing Records' option is used. The vulnerability arises because the CSV import process does not properly sanitize or validate input fields, allowing an attacker to embed malicious JavaScript code within a CSV field. When this maliciously crafted CSV is imported, the payload is stored in the ERPNext database. Subsequently, whenever a user views the affected record through the ERPNext web interface, the embedded script executes in the context of the victim's browser session. This can lead to session hijacking, theft of sensitive information, or execution of unauthorized actions under the victim's privileges. The vulnerability requires the attacker to have at least limited privileges to perform CSV imports and requires user interaction to trigger the malicious script. The CVSS v3.1 base score is 5.4, reflecting medium severity, with an attack vector of network, low attack complexity, privileges required, and user interaction needed. The scope is changed, indicating that the vulnerability affects resources beyond the initially vulnerable component. No public exploits have been reported yet, but the vulnerability is classified under CWE-79, a common and impactful web security weakness. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for mitigation through configuration and operational controls.

Potential Impact

For European organizations using ERPNext, this vulnerability poses a risk to the confidentiality and integrity of user sessions and data. Attackers exploiting this flaw could hijack user sessions, leading to unauthorized access to sensitive business information, manipulation of records, or execution of actions under legitimate user accounts. This could result in data breaches, financial fraud, or disruption of business processes. Since ERPNext is an open-source ERP system popular among small to medium enterprises and some public sector entities in Europe, the impact could be significant where the software is used to manage critical business functions. The vulnerability does not directly affect availability but could indirectly cause operational disruptions if exploited. Additionally, GDPR compliance implications arise if personal data is compromised due to this vulnerability, potentially leading to regulatory penalties. The medium severity score indicates that while the vulnerability is not trivial, it requires some level of privilege and user interaction, somewhat limiting the attack surface but still warranting prompt attention.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict CSV import permissions strictly to trusted and trained personnel to minimize the risk of malicious CSV uploads. 2) Implement input validation and sanitization at the application layer, ensuring that CSV fields do not contain executable scripts or HTML content before import. 3) Employ Content Security Policy (CSP) headers in the ERPNext web interface to limit the execution of unauthorized scripts. 4) Monitor and audit CSV import activities and user actions to detect anomalous behavior or unauthorized imports. 5) Educate users about the risks of interacting with untrusted data within ERPNext. 6) Regularly update ERPNext to the latest versions once patches addressing this vulnerability are released. 7) Consider deploying web application firewalls (WAFs) with rules targeting XSS payloads in HTTP requests. 8) Isolate ERPNext instances and enforce strict network segmentation to limit lateral movement if exploitation occurs. These measures go beyond generic advice by focusing on operational controls, user training, and layered defenses tailored to the CSV import vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6982fcd3f9fa50a62f7662fd

Added to database: 2/4/2026, 8:01:23 AM

Last enriched: 2/11/2026, 12:04:40 PM

Last updated: 3/25/2026, 4:19:38 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses