{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-52895","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-06-20T17:42:25.710Z","datePublished":"2025-06-30T17:05:36.027Z","dateUpdated":"2025-06-30T20:40:43.365Z"},"containers":{"cna":{"title":"Frappe possibility of SQL injection due to improper validations","problemTypes":[{"descriptions":[{"cweId":"CWE-89","lang":"en","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":8.7,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/frappe/frappe/security/advisories/GHSA-mhj8-jfhf-mcw9","tags":["x_refsource_CONFIRM"],"url":"https://github.com/frappe/frappe/security/advisories/GHSA-mhj8-jfhf-mcw9"},{"name":"https://github.com/frappe/frappe/pull/31526","tags":["x_refsource_MISC"],"url":"https://github.com/frappe/frappe/pull/31526"},{"name":"https://github.com/frappe/frappe/commit/c795e351be033070174437324d74f44759a744a6","tags":["x_refsource_MISC"],"url":"https://github.com/frappe/frappe/commit/c795e351be033070174437324d74f44759a744a6"},{"name":"https://github.com/frappe/frappe/commit/f0933590103c80c6393647dd0403d399e64c951c","tags":["x_refsource_MISC"],"url":"https://github.com/frappe/frappe/commit/f0933590103c80c6393647dd0403d399e64c951c"}],"affected":[{"vendor":"frappe","product":"frappe","versions":[{"version":"< 15.58.0","status":"affected"},{"version":"< 14.94.3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-06-30T17:05:36.027Z"},"descriptions":[{"lang":"en","value":"Frappe is a full-stack web application framework. Prior to versions 14.94.3 and 15.58.0, SQL injection could be achieved via a specially crafted request, which could allow malicious person to gain access to sensitive information. This issue has been patched in versions 14.94.3 and 15.58.0. There are no workarounds for this issue other than upgrading."}],"source":{"advisory":"GHSA-mhj8-jfhf-mcw9","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-30T20:40:36.810700Z","id":"CVE-2025-52895","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-30T20:40:43.365Z"}}]}}