Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65924: n/a

0
Medium
VulnerabilityCVE-2025-65924cvecve-2025-65924
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

ERPNext thru 15.88.1 does not sanitize or remove certain HTML tags specifically `<a>` hyperlinks in fields that are intended for plain text. Although JavaScript is blocked (preventing XSS), the HTML is still preserved in the generated PDF document. As a result, an attacker can inject malicious clickable links into an ERP-generated PDF. Since PDF files generated by the ERP system are generally considered trustworthy, users are highly likely to click these links, potentially enabling phishing attacks or malware delivery. This issue occurs in the Add Quality Goal' function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 13:57:28 UTC

Technical Analysis

CVE-2025-65924 is a vulnerability identified in ERPNext versions through 15.88.1 that arises from improper sanitization of HTML content in fields expected to contain plain text, specifically within the 'Add Quality Goal' functionality. While the system blocks JavaScript to prevent cross-site scripting (XSS), it does not remove or sanitize <a> hyperlink tags embedded in user input. Consequently, when ERPNext generates PDF documents from these fields, the malicious hyperlinks remain active and clickable. Since ERP-generated PDFs are generally trusted by users, attackers can exploit this behavior to embed malicious links that may lead to phishing sites or malware downloads. The attack vector requires an authenticated user to input the malicious content and a recipient to interact with the PDF by clicking the link. The vulnerability impacts document integrity and user security by enabling social engineering attacks through trusted documents. The CVSS score is 4.1 (medium), reflecting the need for authentication and user interaction, no direct confidentiality or availability impact, and relatively low complexity to exploit once authenticated. No patches or known exploits are currently available, emphasizing the need for proactive mitigation. This issue is classified under CWE-80 (Improper Neutralization of Script-Related HTML Tags in a Web Page).

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of business documents and the security of end users who rely on ERPNext-generated PDFs for operational decisions. Malicious links embedded in trusted PDFs can facilitate phishing campaigns or malware infections, potentially leading to credential theft, lateral movement within networks, or disruption of business processes. Industries with heavy ERPNext usage, such as manufacturing, supply chain management, and quality assurance, may face increased exposure. The requirement for authenticated access limits the attack surface to internal or trusted users, but insider threats or compromised accounts could exploit this vector. The social engineering aspect increases the likelihood of successful exploitation, especially in environments with less security awareness. While confidentiality and availability are not directly impacted, the reputational damage and operational disruptions from successful phishing or malware attacks could be significant. European data protection regulations (e.g., GDPR) may also impose compliance risks if such attacks lead to data breaches.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit and restrict access to the 'Add Quality Goal' function to trusted personnel only, minimizing the risk of malicious input. 2) Implement input validation and sanitization at the application level to strip or encode HTML tags, especially <a> tags, in fields intended for plain text before PDF generation. 3) Where possible, update ERPNext to versions beyond 15.88.1 once patches addressing this vulnerability are released. 4) Educate users to treat ERP-generated PDFs with caution and verify links before clicking, particularly those received from internal sources. 5) Employ PDF scanning tools that can detect and flag suspicious hyperlinks in generated documents. 6) Monitor logs for unusual activity related to the 'Add Quality Goal' function and PDF generation. 7) Consider deploying endpoint protection solutions capable of detecting phishing and malware payloads delivered via PDFs. 8) Engage with ERPNext vendors or community to track patch releases and vulnerability disclosures. These measures go beyond generic advice by focusing on access control, input sanitization, user education, and document inspection tailored to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6982fcd3f9fa50a62f766300

Added to database: 2/4/2026, 8:01:23 AM

Last enriched: 2/18/2026, 1:57:28 PM

Last updated: 3/23/2026, 11:21:10 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses