Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66434: n/a

0
High
VulnerabilityCVE-2025-66434cvecve-2025-66434
Published: Mon Dec 15 2025 (12/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An SSTI (Server-Side Template Injection) vulnerability exists in the get_dunning_letter_text method of Frappe ERPNext through 15.89.0. The function renders attacker-controlled Jinja2 templates (body_text) using frappe.render_template() with a user-supplied context (doc). Although Frappe uses a custom SandboxedEnvironment, several dangerous globals such as frappe.db.sql are still available in the execution context via get_safe_globals(). An authenticated attacker with access to configure Dunning Type and its child table Dunning Letter Text can inject arbitrary Jinja expressions, resulting in server-side code execution within a restricted but still unsafe context. This can leak database information.

AI-Powered Analysis

AILast updated: 12/22/2025, 18:04:37 UTC

Technical Analysis

CVE-2025-66434 is a Server-Side Template Injection vulnerability found in the get_dunning_letter_text method of Frappe ERPNext versions through 15.89.0. The vulnerability stems from the method rendering Jinja2 templates using frappe.render_template() with a user-supplied context (doc). Although Frappe employs a custom SandboxedEnvironment intended to restrict template execution, it still exposes several dangerous global functions, including frappe.db.sql, through get_safe_globals(). This exposure allows an authenticated attacker who has permissions to configure the Dunning Type and its child table Dunning Letter Text to inject arbitrary Jinja2 expressions. These expressions can execute server-side code within the restricted environment, enabling actions such as arbitrary database queries, data exfiltration, and potentially full server compromise. The vulnerability requires authentication and specific configuration privileges but does not require additional user interaction. The CVSS 3.1 score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. No known public exploits have been reported yet, but the presence of dangerous globals in the template context makes exploitation feasible. The vulnerability is categorized under CWE-1336 (Improper Neutralization of Input During Template Processing), highlighting the risks of unsafe template rendering in web applications. ERPNext is widely used in enterprise resource planning, especially in finance and manufacturing sectors, making this vulnerability critical for organizations relying on this software.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of critical business data managed by ERPNext. Attackers with access to configure Dunning Types can execute arbitrary code on the server, potentially leading to unauthorized database queries, data leakage of sensitive financial and operational information, and disruption of ERP services. This can result in financial losses, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and operational downtime. Given ERPNext's role in managing invoicing, payments, and customer communications, exploitation could also damage customer trust and business reputation. The requirement for authenticated access limits the attack surface but does not eliminate risk, especially in environments with weak internal access controls or compromised credentials. The lack of a patch at the time of disclosure increases exposure, necessitating immediate mitigation efforts. The vulnerability's impact is amplified in sectors with high reliance on ERP systems, such as manufacturing, retail, and finance, which are prevalent in Europe.

Mitigation Recommendations

1. Immediately restrict access to the configuration of Dunning Types and the Dunning Letter Text child table to only the most trusted and necessary personnel. 2. Monitor and audit all changes to Dunning Type configurations and template content for suspicious activity. 3. Apply any official patches or updates from Frappe ERPNext as soon as they become available. 4. If patches are not yet available, consider temporarily disabling or limiting the functionality that allows editing of Dunning Letter Text templates. 5. Review and harden the template rendering environment by removing or restricting dangerous globals such as frappe.db.sql from the template context. 6. Implement strong authentication and authorization controls to prevent unauthorized access to configuration features. 7. Conduct internal penetration testing focusing on template injection vectors to identify any other similar vulnerabilities. 8. Educate administrators and developers about the risks of SSTI and safe template handling practices. 9. Employ network segmentation and monitoring to detect anomalous database queries or server-side code execution attempts. 10. Prepare incident response plans to quickly address potential exploitation scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-30T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69403ea1d9bcdf3f3deea906

Added to database: 12/15/2025, 5:00:17 PM

Last enriched: 12/22/2025, 6:04:37 PM

Last updated: 2/6/2026, 9:27:27 AM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats