CVE-2025-68928: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in frappe crm
Frappe CRM is an open-source customer relationship management tool. Prior to version 1.56.2, authenticated users could set crafted URLs in a website field, which were not sanitized, causing cross-site scripting. Version 1.56.2 fixes the issue. No known workarounds are available.
AI Analysis
Technical Summary
CVE-2025-68928 is a cross-site scripting (XSS) vulnerability identified in the open-source Frappe CRM software, specifically affecting versions prior to 1.56.2. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). Authenticated users can input crafted URLs into a website field that the application fails to sanitize correctly. This flaw allows malicious scripts to be injected and executed in the browsers of other users who view the affected content, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The vulnerability requires the attacker to have authenticated access and for the victim to interact with the maliciously crafted content, which limits the attack surface but still poses a significant risk in multi-user environments. The CVSS v3.1 base score is 5.4 (medium), reflecting network attack vector, low attack complexity, required privileges, and user interaction. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. No known exploits have been reported in the wild, and no workarounds exist other than upgrading to version 1.56.2, which includes proper input sanitization to mitigate the issue.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive information and compromise of user accounts within Frappe CRM deployments. The XSS flaw could be exploited to steal session cookies, perform actions on behalf of legitimate users, or deliver further malware payloads. This is particularly concerning for sectors handling sensitive customer data such as finance, healthcare, and technology companies. The medium severity and requirement for authenticated access reduce the likelihood of widespread automated exploitation but do not eliminate the risk of targeted attacks or insider threats. Additionally, compromised CRM systems can undermine trust and regulatory compliance, especially under GDPR, where data breaches involving personal data can lead to significant fines. The absence of known exploits suggests a window of opportunity for defenders to patch systems before attackers develop weaponized exploits.
Mitigation Recommendations
European organizations should immediately upgrade all Frappe CRM instances to version 1.56.2 or later to remediate the vulnerability. In addition to patching, organizations should implement strict input validation and output encoding on all user-supplied data fields, especially those that render HTML or URLs. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct regular security audits and penetration testing focused on web application vulnerabilities, including XSS. Limit authenticated user privileges to the minimum necessary to reduce the risk posed by malicious insiders or compromised accounts. Monitor logs for unusual activities related to URL fields or user input that could indicate exploitation attempts. Finally, educate users about the risks of interacting with suspicious links or content within the CRM environment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-68928: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in frappe crm
Description
Frappe CRM is an open-source customer relationship management tool. Prior to version 1.56.2, authenticated users could set crafted URLs in a website field, which were not sanitized, causing cross-site scripting. Version 1.56.2 fixes the issue. No known workarounds are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-68928 is a cross-site scripting (XSS) vulnerability identified in the open-source Frappe CRM software, specifically affecting versions prior to 1.56.2. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). Authenticated users can input crafted URLs into a website field that the application fails to sanitize correctly. This flaw allows malicious scripts to be injected and executed in the browsers of other users who view the affected content, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The vulnerability requires the attacker to have authenticated access and for the victim to interact with the maliciously crafted content, which limits the attack surface but still poses a significant risk in multi-user environments. The CVSS v3.1 base score is 5.4 (medium), reflecting network attack vector, low attack complexity, required privileges, and user interaction. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. No known exploits have been reported in the wild, and no workarounds exist other than upgrading to version 1.56.2, which includes proper input sanitization to mitigate the issue.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive information and compromise of user accounts within Frappe CRM deployments. The XSS flaw could be exploited to steal session cookies, perform actions on behalf of legitimate users, or deliver further malware payloads. This is particularly concerning for sectors handling sensitive customer data such as finance, healthcare, and technology companies. The medium severity and requirement for authenticated access reduce the likelihood of widespread automated exploitation but do not eliminate the risk of targeted attacks or insider threats. Additionally, compromised CRM systems can undermine trust and regulatory compliance, especially under GDPR, where data breaches involving personal data can lead to significant fines. The absence of known exploits suggests a window of opportunity for defenders to patch systems before attackers develop weaponized exploits.
Mitigation Recommendations
European organizations should immediately upgrade all Frappe CRM instances to version 1.56.2 or later to remediate the vulnerability. In addition to patching, organizations should implement strict input validation and output encoding on all user-supplied data fields, especially those that render HTML or URLs. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct regular security audits and penetration testing focused on web application vulnerabilities, including XSS. Limit authenticated user privileges to the minimum necessary to reduce the risk posed by malicious insiders or compromised accounts. Monitor logs for unusual activities related to URL fields or user input that could indicate exploitation attempts. Finally, educate users about the risks of interacting with suspicious links or content within the CRM environment.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-24T23:40:31.797Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695450badb813ff03e2bf7cd
Added to database: 12/30/2025, 10:22:50 PM
Last enriched: 12/30/2025, 11:40:24 PM
Last updated: 2/3/2026, 3:21:34 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67482: Vulnerability in Wikimedia Foundation Scribunto
LowCVE-2025-58383: CWE-250: Execution with Unnecessary Privileges in Brocade Fabric OS
HighCVE-2025-58382: CWE-305: Authentication Bypass by Primary Weakness in Brocade Fabric OS
HighCVE-2025-58379: CWE-250 Execution with Unnecessary Privileges in Brocade Fabric OS
MediumCVE-2025-12774: CWE-312 Cleartext Storage of Sensitive Information in Brocade SANnav
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.