CVE-2025-68928

5.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users of Frappe CRM to inject malicious scripts via website fields, leading to cross-site scripting (XSS) attacks. The issue affects all Frappe CRM instances running versions before 1.56.2. Attackers could steal session cookies, redirect users, or perform actions on behalf of authenticated users.

💻 Affected Systems

Products:
  • Frappe CRM
Versions: All versions prior to 1.56.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker steals administrator session cookies, gains full system control, and compromises all user data.

🟠

Likely Case

Authenticated user exploits XSS to steal other users' session tokens or perform unauthorized actions.

🟢

If Mitigated

With proper input validation and output encoding, impact is limited to minor UI disruption.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of vulnerable field.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.56.2

Vendor Advisory: https://github.com/frappe/crm/security/advisories/GHSA-fm34-v6j7-chwc

Restart Required: Yes

Instructions:

1. Backup your Frappe CRM instance. 2. Update to version 1.56.2 using 'bench update'. 3. Restart the Frappe application server. 4. Verify the update completed successfully.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads in website fields.
  • Disable website field functionality or implement custom input validation at the application layer.

🔍 How to Verify

Check if Vulnerable:

Check if Frappe CRM version is below 1.56.2 using 'bench version' command.

Check Version:

bench version

Verify Fix Applied:

Verify version is 1.56.2 or higher and test website field with XSS payloads to confirm sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual website field entries containing script tags or JavaScript code
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests with suspicious payloads in website field parameters

SIEM Query:

web.url:*<script* OR web.url:*javascript:* AND destination.port:80 OR destination.port:443

🔗 References

📤 Share & Export