CVE-2025-28062

8.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery vulnerability in ERPNEXT allows attackers to trick authenticated users into performing unauthorized actions like deleting users, resetting passwords, or escalating privileges. This affects ERPNEXT versions 14.82.1 and 14.74.3 where CSRF protections are missing. Any organization using these vulnerable versions is at risk.

💻 Affected Systems

Products:
  • ERPNEXT
Versions: 14.82.1 and 14.74.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through admin account takeover, data destruction via mass user deletion, and privilege escalation granting attackers full administrative control.

🟠

Likely Case

Targeted attacks against specific users to reset passwords, delete accounts, or modify permissions, leading to business disruption and potential data loss.

🟢

If Mitigated

Limited impact with proper CSRF protections, session management, and user awareness reducing successful exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated user into visiting a malicious page. Public proof-of-concept code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check latest ERPNEXT releases after 14.82.1 and 14.74.3

Vendor Advisory: https://github.com/frappe/erpnext

Restart Required: Yes

Instructions:

1. Backup your ERPNEXT instance and database. 2. Update ERPNEXT to the latest patched version via the bench update command. 3. Restart the ERPNEXT services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Manually add CSRF token validation to vulnerable endpoints

Requires code modification - consult ERPNEXT documentation for CSRF implementation

Use SameSite Cookies

all

Configure session cookies with SameSite=Strict attribute

Set session.cookie.samesite = 'Strict' in your ERPNEXT configuration

🧯 If You Can't Patch

  • Implement web application firewall rules to detect and block CSRF attempts
  • Enforce strict session management with short timeouts and re-authentication for sensitive actions

🔍 How to Verify

Check if Vulnerable:

Check your ERPNEXT version. If it's 14.82.1 or 14.74.3, you are vulnerable.

Check Version:

bench version

Verify Fix Applied:

After updating, test CSRF protection by attempting to perform actions without proper tokens.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful sensitive actions
  • Unusual user deletion or permission change patterns

Network Indicators:

  • Requests to sensitive endpoints without Referer headers or CSRF tokens
  • Multiple POST requests from same IP to different user accounts

SIEM Query:

source="erpnext" AND (action="delete_user" OR action="reset_password" OR action="change_permission") | stats count by src_ip, user

🔗 References

📤 Share & Export