First published: Wed Feb 07 2024(Updated: )
Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and a tightly integrated client side library. Prior to versions 14.59.0 and 15.5.0, portal pages are susceptible to Cross-Site Scripting (XSS) which can be used to inject malicious JS code if user clicks on a malicious link. This vulnerability has been patched in versions 14.59.0 and 15.5.0. No known workarounds are available.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Frappe LMS | <14.59.0 | |
Frappe LMS | >=15.0.0<15.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24812 is classified as a high severity vulnerability due to its potential for Cross-Site Scripting (XSS) exploitation.
To remediate CVE-2024-24812, upgrade Frappe to version 14.59.0 or 15.5.0 or later.
CVE-2024-24812 affects Frappe versions prior to 14.59.0 and versions between 15.0.0 and 15.5.0.
CVE-2024-24812 is a Cross-Site Scripting (XSS) vulnerability.
An attacker exploiting CVE-2024-24812 can inject malicious JavaScript code into portal pages.