First published: Wed Jun 22 2022(Updated: )
In ERPNext, versions v12.0.9--v13.0.3 are vulnerable to Stored Cross-Site-Scripting (XSS), due to user input not being validated properly. A low privileged attacker could inject arbitrary code into input fields when editing his profile.
Credit: vulnerabilitylab@mend.io
Affected Software | Affected Version | How to fix |
---|---|---|
Frappe ERPNext | >=12.0.9<13.1.0 |
Update version to v13.1.0 or later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23057 is a vulnerability in ERPNext versions v12.0.9--v13.0.3 that allows for Stored Cross-Site-Scripting (XSS) attacks.
The vulnerability CVE-2022-23057 allows a low privileged attacker to inject arbitrary code into input fields when editing their profile in ERPNext.
The severity level of CVE-2022-23057 is medium with a CVSS score of 5.4.
Yes, a fix for CVE-2022-23057 is available in ERPNext versions v13.1.0 and above.
You can find more information about CVE-2022-23057 in the GitHub commit (https://github.com/frappe/frappe/commit/497ea861f481c6a3c52fe2aed9d0df1b6c99e9d7) and the vulnerability database (https://www.mend.io/vulnerability-database/CVE-2022-23057).