ERP is a free and open source Enterprise Resource Planning tool. In versions prior to 16.8.0 and 15.100.0, certain endpoints were vulnerable to time-based and boolean-based blind SQL injection due to insufficient parameter validation, allowing attackers to infer database information. This issue has been fixed in versions 15.100.0 and 16.8.0.
References
| Link | Resource |
|---|---|
| https://github.com/frappe/erpnext/releases/tag/v15.100.0 | Product Release Notes |
| https://github.com/frappe/erpnext/releases/tag/v16.8.0 | Product Release Notes |
| https://github.com/frappe/erpnext/security/advisories/GHSA-j669-ghv2-gmqg | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-20 05:16
Updated : 2026-03-23 19:35
NVD link : CVE-2026-32954
Mitre link : CVE-2026-32954
CVE.ORG link : CVE-2026-32954
JSON object : View
Products Affected
frappe
- erpnext
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
