CVE-2026-29077

7.1 HIGH

📋 TL;DR

This vulnerability in Frappe framework allows authenticated users to share documents with permissions they don't possess, potentially granting unauthorized access to sensitive data. All Frappe installations running vulnerable versions are affected. The issue stems from improper access control validation during document sharing operations.

💻 Affected Systems

Products:
  • Frappe Framework
Versions: All versions before 15.98.0 and 14.100.0
Operating Systems: All operating systems running Frappe
Default Config Vulnerable: ⚠️ Yes
Notes: All Frappe installations with document sharing functionality enabled are vulnerable. The vulnerability requires authenticated user access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated user could escalate privileges by sharing sensitive documents with themselves or others using higher permissions than authorized, potentially accessing confidential business data, financial records, or personally identifiable information.

🟠

Likely Case

Internal users accidentally or intentionally sharing documents beyond their intended scope, leading to data exposure within the organization but not necessarily privilege escalation.

🟢

If Mitigated

With proper network segmentation and least-privilege access controls, impact would be limited to unauthorized document access within the same security zone.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the Frappe application. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 15.98.0 or 14.100.0

Vendor Advisory: https://github.com/frappe/frappe/security/advisories/GHSA-5h4c-9p23-4c3m

Restart Required: Yes

Instructions:

1. Backup your Frappe installation and database. 2. Update Frappe using bench update command: bench update --frappe. 3. Verify the update completed successfully. 4. Restart the Frappe application services.

🔧 Temporary Workarounds

Disable Document Sharing

all

Temporarily disable document sharing functionality to prevent exploitation

bench --site [site-name] set-config disable_document_sharing true

Restrict User Permissions

all

Implement strict role-based access control and review all user permissions

🧯 If You Can't Patch

  • Implement network segmentation to isolate Frappe instances from sensitive data stores
  • Enable detailed audit logging for all document sharing operations and monitor for anomalies

🔍 How to Verify

Check if Vulnerable:

Check Frappe version using: bench version

Check Version:

bench version

Verify Fix Applied:

Verify version is 15.98.0 or higher (for v15) or 14.100.0 or higher (for v14)

📡 Detection & Monitoring

Log Indicators:

  • Unusual document sharing patterns
  • Users sharing documents with permissions they shouldn't have
  • Multiple failed permission validation attempts

Network Indicators:

  • Increased API calls to document sharing endpoints from single users

SIEM Query:

source="frappe_logs" AND (event="document_share" OR event="permission_check") AND result="success" WHERE user_permissions NOT IN allowed_permissions

🔗 References

📤 Share & Export