CVE-2025-65924: n/a
ERPNext thru 15.88.1 does not sanitize or remove certain HTML tags specifically `<a>` hyperlinks in fields that are intended for plain text. Although JavaScript is blocked (preventing XSS), the HTML is still preserved in the generated PDF document. As a result, an attacker can inject malicious clickable links into an ERP-generated PDF. Since PDF files generated by the ERP system are generally considered trustworthy, users are highly likely to click these links, potentially enabling phishing attacks or malware delivery. This issue occurs in the Add Quality Goal' function.
AI Analysis
Technical Summary
CVE-2025-65924 is a vulnerability identified in ERPNext versions through 15.88.1, specifically affecting the 'Add Quality Goal' function. The core issue is that the application does not properly sanitize or remove certain HTML tags, notably <a> hyperlink tags, in fields that are intended to contain only plain text. Although the system blocks JavaScript execution, preventing traditional cross-site scripting (XSS) attacks, the HTML anchor tags remain embedded in the generated PDF documents. Since these PDFs are produced by the ERP system and are generally considered trustworthy by users, the presence of malicious clickable links can be exploited by attackers to conduct phishing attacks or deliver malware. The attacker can inject these malicious links by submitting crafted input into the vulnerable field, which then appears in the PDF output without adequate filtering. This vulnerability leverages the trust users place in ERP-generated documents, increasing the likelihood of successful social engineering attacks. No official CVSS score has been assigned yet, and there are no known exploits in the wild. The vulnerability highlights a gap in input validation and output sanitization in ERPNext’s PDF generation process, particularly in quality management modules. Organizations using ERPNext for quality goals and reporting should be aware of this threat vector and the potential for malicious link injection in trusted documents.
Potential Impact
For European organizations, the impact of CVE-2025-65924 can be significant, especially those in manufacturing, quality assurance, and supply chain sectors that rely heavily on ERPNext for managing quality goals and generating official documentation. The injection of malicious links into trusted PDF reports can lead to successful phishing campaigns, resulting in credential theft, unauthorized access, or malware infections. This could compromise sensitive business data, disrupt operations, and cause reputational damage. Since ERP-generated PDFs are often shared internally and externally, the attack surface extends beyond the immediate organization to partners and clients, increasing the risk of supply chain attacks. The trust placed in ERP documents means users may be less vigilant, raising the likelihood of exploitation. Additionally, regulatory compliance risks arise if malicious activity leads to data breaches under GDPR. The lack of known exploits currently limits immediate widespread impact, but the vulnerability’s presence in a widely used open-source ERP platform means that targeted attacks could emerge, particularly against high-value European industrial and commercial entities.
Mitigation Recommendations
To mitigate CVE-2025-65924, organizations should implement the following specific measures: 1) Apply patches or updates from ERPNext as soon as they become available that address HTML sanitization in PDF generation. 2) In the interim, customize or extend ERPNext’s PDF generation logic to sanitize or strip all HTML tags, especially <a> tags, from fields intended for plain text before rendering PDFs. 3) Implement input validation controls to reject or escape HTML content in user inputs for quality goal fields. 4) Educate users to treat ERP-generated PDFs with caution, verifying links before clicking, especially if unexpected. 5) Use PDF security features such as disabling clickable links or warning users when links are present in generated documents. 6) Monitor logs and user reports for suspicious activity related to PDF documents. 7) Restrict permissions for users who can add or modify quality goals to reduce the risk of malicious input. 8) Consider deploying endpoint protection solutions capable of detecting phishing or malware attempts originating from malicious links. These targeted actions go beyond generic advice by focusing on the specific vulnerability vector and the ERPNext environment.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-65924: n/a
Description
ERPNext thru 15.88.1 does not sanitize or remove certain HTML tags specifically `<a>` hyperlinks in fields that are intended for plain text. Although JavaScript is blocked (preventing XSS), the HTML is still preserved in the generated PDF document. As a result, an attacker can inject malicious clickable links into an ERP-generated PDF. Since PDF files generated by the ERP system are generally considered trustworthy, users are highly likely to click these links, potentially enabling phishing attacks or malware delivery. This issue occurs in the Add Quality Goal' function.
AI-Powered Analysis
Technical Analysis
CVE-2025-65924 is a vulnerability identified in ERPNext versions through 15.88.1, specifically affecting the 'Add Quality Goal' function. The core issue is that the application does not properly sanitize or remove certain HTML tags, notably <a> hyperlink tags, in fields that are intended to contain only plain text. Although the system blocks JavaScript execution, preventing traditional cross-site scripting (XSS) attacks, the HTML anchor tags remain embedded in the generated PDF documents. Since these PDFs are produced by the ERP system and are generally considered trustworthy by users, the presence of malicious clickable links can be exploited by attackers to conduct phishing attacks or deliver malware. The attacker can inject these malicious links by submitting crafted input into the vulnerable field, which then appears in the PDF output without adequate filtering. This vulnerability leverages the trust users place in ERP-generated documents, increasing the likelihood of successful social engineering attacks. No official CVSS score has been assigned yet, and there are no known exploits in the wild. The vulnerability highlights a gap in input validation and output sanitization in ERPNext’s PDF generation process, particularly in quality management modules. Organizations using ERPNext for quality goals and reporting should be aware of this threat vector and the potential for malicious link injection in trusted documents.
Potential Impact
For European organizations, the impact of CVE-2025-65924 can be significant, especially those in manufacturing, quality assurance, and supply chain sectors that rely heavily on ERPNext for managing quality goals and generating official documentation. The injection of malicious links into trusted PDF reports can lead to successful phishing campaigns, resulting in credential theft, unauthorized access, or malware infections. This could compromise sensitive business data, disrupt operations, and cause reputational damage. Since ERP-generated PDFs are often shared internally and externally, the attack surface extends beyond the immediate organization to partners and clients, increasing the risk of supply chain attacks. The trust placed in ERP documents means users may be less vigilant, raising the likelihood of exploitation. Additionally, regulatory compliance risks arise if malicious activity leads to data breaches under GDPR. The lack of known exploits currently limits immediate widespread impact, but the vulnerability’s presence in a widely used open-source ERP platform means that targeted attacks could emerge, particularly against high-value European industrial and commercial entities.
Mitigation Recommendations
To mitigate CVE-2025-65924, organizations should implement the following specific measures: 1) Apply patches or updates from ERPNext as soon as they become available that address HTML sanitization in PDF generation. 2) In the interim, customize or extend ERPNext’s PDF generation logic to sanitize or strip all HTML tags, especially <a> tags, from fields intended for plain text before rendering PDFs. 3) Implement input validation controls to reject or escape HTML content in user inputs for quality goal fields. 4) Educate users to treat ERP-generated PDFs with caution, verifying links before clicking, especially if unexpected. 5) Use PDF security features such as disabling clickable links or warning users when links are present in generated documents. 6) Monitor logs and user reports for suspicious activity related to PDF documents. 7) Restrict permissions for users who can add or modify quality goals to reduce the risk of malicious input. 8) Consider deploying endpoint protection solutions capable of detecting phishing or malware attempts originating from malicious links. These targeted actions go beyond generic advice by focusing on the specific vulnerability vector and the ERPNext environment.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6982fcd3f9fa50a62f766300
Added to database: 2/4/2026, 8:01:23 AM
Last enriched: 2/4/2026, 8:11:01 AM
Last updated: 2/7/2026, 6:22:04 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
UnknownCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.