Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27471: CWE-862: Missing Authorization in frappe erpnext

0
Critical
VulnerabilityCVE-2026-27471cvecve-2026-27471cwe-862cwe-306cwe-284
Published: Sat Feb 21 2026 (02/21/2026, 06:38:11 UTC)
Source: CVE Database V5
Vendor/Project: frappe
Product: erpnext

Description

ERP is a free and open source Enterprise Resource Planning tool. In versions up to 15.98.0 and 16.0.0-rc.1 and through 16.6.0, certain endpoints lacked access validation which allowed for unauthorized document access. This issue has been fixed in versions 15.98.1 and 16.6.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:39:57 UTC

Technical Analysis

CVE-2026-27471 is a critical missing authorization vulnerability (CWE-862) in ERPNext, an open-source Enterprise Resource Planning (ERP) software developed by Frappe. The vulnerability affects ERPNext versions up to 15.98.0 and from 16.0.0-rc.1 through 16.6.0. The root cause is the absence of proper access control validation on certain API endpoints, which allows unauthenticated attackers to retrieve or manipulate documents that should be protected. This bypass of authorization controls means that attackers can access sensitive business data such as financial records, customer information, or inventory details without any credentials or user interaction. The vulnerability is classified under CWE-862 (Missing Authorization), CWE-306 (Missing Authentication), and CWE-284 (Improper Access Control), highlighting multiple facets of access control failures. The CVSS 4.0 base score is 9.3, reflecting network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality and integrity. The issue was publicly disclosed on February 21, 2026, and fixed in ERPNext versions 15.98.1 and 16.6.1. No known exploits have been reported in the wild yet, but the severity and ease of exploitation make it a critical risk for organizations using vulnerable versions.

Potential Impact

The vulnerability allows attackers to bypass authorization controls and access sensitive documents within ERPNext installations. This can lead to unauthorized disclosure of confidential business data, including financial, customer, and operational information, potentially resulting in data breaches and regulatory non-compliance. Attackers could also manipulate data integrity by altering documents, which may disrupt business operations, financial reporting, and decision-making processes. Since ERPNext is often used by small and medium enterprises (SMEs) worldwide to manage critical business functions, exploitation could cause significant operational and reputational damage. The lack of authentication or user interaction required for exploitation increases the risk of automated attacks and widespread compromise. Organizations relying on vulnerable ERPNext versions face increased exposure to espionage, fraud, and sabotage.

Mitigation Recommendations

Organizations should immediately upgrade ERPNext to versions 15.98.1 or 16.6.1 or later, where the authorization checks have been properly implemented. Until patching is possible, restrict network access to ERPNext API endpoints by implementing firewall rules or VPN access to limit exposure to trusted users only. Conduct thorough audits of ERPNext access logs to detect any unauthorized access attempts or suspicious activity. Implement additional application-layer access controls or web application firewalls (WAF) to monitor and block anomalous API requests. Educate system administrators and developers on secure coding practices to prevent missing authorization issues in custom ERPNext extensions or integrations. Regularly review and update ERPNext and its dependencies to ensure timely application of security patches. Finally, maintain offline backups of critical ERP data to enable recovery in case of data manipulation or breach.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-19T17:25:31.101Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699954f1be58cf853b55f45f

Added to database: 2/21/2026, 6:47:13 AM

Last enriched: 2/28/2026, 12:39:57 PM

Last updated: 4/7/2026, 1:34:54 PM

Views: 304

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses