Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68928: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in frappe crm

0
Medium
VulnerabilityCVE-2025-68928cvecve-2025-68928cwe-79
Published: Mon Dec 29 2025 (12/29/2025, 15:06:31 UTC)
Source: CVE Database V5
Vendor/Project: frappe
Product: crm

Description

Frappe CRM is an open-source customer relationship management tool. Prior to version 1.56.2, authenticated users could set crafted URLs in a website field, which were not sanitized, causing cross-site scripting. Version 1.56.2 fixes the issue. No known workarounds are available.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:40:24 UTC

Technical Analysis

CVE-2025-68928 is a cross-site scripting (XSS) vulnerability identified in the open-source Frappe CRM software, specifically affecting versions prior to 1.56.2. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). Authenticated users can input crafted URLs into a website field that the application fails to sanitize correctly. This flaw allows malicious scripts to be injected and executed in the browsers of other users who view the affected content, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The vulnerability requires the attacker to have authenticated access and for the victim to interact with the maliciously crafted content, which limits the attack surface but still poses a significant risk in multi-user environments. The CVSS v3.1 base score is 5.4 (medium), reflecting network attack vector, low attack complexity, required privileges, and user interaction. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. No known exploits have been reported in the wild, and no workarounds exist other than upgrading to version 1.56.2, which includes proper input sanitization to mitigate the issue.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive information and compromise of user accounts within Frappe CRM deployments. The XSS flaw could be exploited to steal session cookies, perform actions on behalf of legitimate users, or deliver further malware payloads. This is particularly concerning for sectors handling sensitive customer data such as finance, healthcare, and technology companies. The medium severity and requirement for authenticated access reduce the likelihood of widespread automated exploitation but do not eliminate the risk of targeted attacks or insider threats. Additionally, compromised CRM systems can undermine trust and regulatory compliance, especially under GDPR, where data breaches involving personal data can lead to significant fines. The absence of known exploits suggests a window of opportunity for defenders to patch systems before attackers develop weaponized exploits.

Mitigation Recommendations

European organizations should immediately upgrade all Frappe CRM instances to version 1.56.2 or later to remediate the vulnerability. In addition to patching, organizations should implement strict input validation and output encoding on all user-supplied data fields, especially those that render HTML or URLs. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct regular security audits and penetration testing focused on web application vulnerabilities, including XSS. Limit authenticated user privileges to the minimum necessary to reduce the risk posed by malicious insiders or compromised accounts. Monitor logs for unusual activities related to URL fields or user input that could indicate exploitation attempts. Finally, educate users about the risks of interacting with suspicious links or content within the CRM environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-24T23:40:31.797Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695450badb813ff03e2bf7cd

Added to database: 12/30/2025, 10:22:50 PM

Last enriched: 12/30/2025, 11:40:24 PM

Last updated: 2/3/2026, 3:21:34 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats