Vulnerabilites related to frappe - press
CVE-2025-53545 (GCVE-0-2025-53545)
Vulnerability from cvelistv5
Published
2025-07-08 15:02
Modified
2025-07-08 20:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). Users can circumvent 2FA login for users due to a lack of server side validation for the same. This vulnerability is fixed in commit ddb439f8eb1816010f2ef653a908648b71f9bba8.
References
▼ | URL | Tags |
---|---|---|
https://github.com/frappe/press/security/advisories/GHSA-fwfh-vhjg-45q4 | x_refsource_CONFIRM | |
https://github.com/frappe/press/commit/ddb439f8eb1816010f2ef653a908648b71f9bba8 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53545", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-08T20:39:52.900475Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-08T20:40:03.224Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "press", "vendor": "frappe", "versions": [ { "status": "affected", "version": "\u003c ddb439f8eb1816010f2ef653a908648b71f9bba8" } ] } ], "descriptions": [ { "lang": "en", "value": "Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). Users can circumvent 2FA login for users due to a lack of server side validation for the same. This vulnerability is fixed in commit ddb439f8eb1816010f2ef653a908648b71f9bba8." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.9, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-08T15:02:29.679Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/frappe/press/security/advisories/GHSA-fwfh-vhjg-45q4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/frappe/press/security/advisories/GHSA-fwfh-vhjg-45q4" }, { "name": "https://github.com/frappe/press/commit/ddb439f8eb1816010f2ef653a908648b71f9bba8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/frappe/press/commit/ddb439f8eb1816010f2ef653a908648b71f9bba8" } ], "source": { "advisory": "GHSA-fwfh-vhjg-45q4", "discovery": "UNKNOWN" }, "title": "Press has a potential 2FA bypass" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-53545", "datePublished": "2025-07-08T15:02:29.679Z", "dateReserved": "2025-07-02T15:15:11.515Z", "dateUpdated": "2025-07-08T20:40:03.224Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-50356 (GCVE-0-2024-50356)
Vulnerability from cvelistv5
Published
2024-10-31 18:02
Modified
2024-11-01 13:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-640 - Weak Password Recovery Mechanism for Forgotten Password
Summary
Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn't be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug.
References
▼ | URL | Tags |
---|---|---|
https://github.com/frappe/press/security/advisories/GHSA-g7mf-rm73-r7g9 | x_refsource_CONFIRM | |
https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-50356", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-01T13:50:47.650226Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-01T13:51:00.632Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "press", "vendor": "frappe", "versions": [ { "status": "affected", "version": "\u003c ba0007c28ac814260f836849bc07d29beea7deb6" } ] } ], "descriptions": [ { "lang": "en", "value": "Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn\u0027t be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-640", "description": "CWE-640: Weak Password Recovery Mechanism for Forgotten Password", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-31T18:02:42.440Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/frappe/press/security/advisories/GHSA-g7mf-rm73-r7g9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/frappe/press/security/advisories/GHSA-g7mf-rm73-r7g9" }, { "name": "https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6" } ], "source": { "advisory": "GHSA-g7mf-rm73-r7g9", "discovery": "UNKNOWN" }, "title": "Press has a potential 2FA bypass" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-50356", "datePublished": "2024-10-31T18:02:42.440Z", "dateReserved": "2024-10-22T17:54:40.958Z", "dateUpdated": "2024-11-01T13:51:00.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-59421 (GCVE-0-2025-59421)
Vulnerability from cvelistv5
Published
2025-09-18 14:42
Modified
2025-09-19 17:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Summary
Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). A bad actor can flood the inbox of a user by repeatedly sending invites (duplicate). The issue is fixed in commit 83c3fc7676c5dbbe1fd5092d21d95a10c7b48615.
References
▼ | URL | Tags |
---|---|---|
https://github.com/frappe/press/security/advisories/GHSA-68qm-vp8f-rpr3 | x_refsource_CONFIRM | |
https://github.com/frappe/press/commit/83c3fc7676c5dbbe1fd5092d21d95a10c7b48615 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-59421", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-19T17:01:14.505872Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-19T17:09:44.449Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "press", "vendor": "frappe", "versions": [ { "status": "affected", "version": "\u003c 83c3fc7676c5dbbe1fd5092d21d95a10c7b48615" } ] } ], "descriptions": [ { "lang": "en", "value": "Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). A bad actor can flood the inbox of a user by repeatedly sending invites (duplicate). The issue is fixed in commit 83c3fc7676c5dbbe1fd5092d21d95a10c7b48615." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 2.7, "baseSeverity": "LOW", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770: Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-18T14:42:40.662Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/frappe/press/security/advisories/GHSA-68qm-vp8f-rpr3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/frappe/press/security/advisories/GHSA-68qm-vp8f-rpr3" }, { "name": "https://github.com/frappe/press/commit/83c3fc7676c5dbbe1fd5092d21d95a10c7b48615", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/frappe/press/commit/83c3fc7676c5dbbe1fd5092d21d95a10c7b48615" } ], "source": { "advisory": "GHSA-68qm-vp8f-rpr3", "discovery": "UNKNOWN" }, "title": "Press vulnerable to email flooding to users due to lack of validation and rate limits" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-59421", "datePublished": "2025-09-18T14:42:40.662Z", "dateReserved": "2025-09-15T19:13:16.904Z", "dateUpdated": "2025-09-19T17:09:44.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-49751 (GCVE-0-2024-49751)
Vulnerability from cvelistv5
Published
2024-10-23 15:45
Modified
2024-10-23 16:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). Prior to commit 5d118a902872d7941f099ad1fb918e2421e79ccd, a user could inject HTML through SaaS signup inputs. The user who injected the unsafe HTML code would only affect themselves and would not affect other users. Commit 5d118a902872d7941f099ad1fb918e2421e79ccd patches this bug.
References
▼ | URL | Tags |
---|---|---|
https://github.com/frappe/press/security/advisories/GHSA-rf69-h96f-rf2j | x_refsource_CONFIRM | |
https://github.com/frappe/press/commit/5d118a902872d7941f099ad1fb918e2421e79ccd | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-49751", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T16:27:03.303358Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-23T16:27:13.106Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "press", "vendor": "frappe", "versions": [ { "status": "affected", "version": "\u003c 5d118a902872d7941f099ad1fb918e2421e79ccd" } ] } ], "descriptions": [ { "lang": "en", "value": "Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). Prior to commit 5d118a902872d7941f099ad1fb918e2421e79ccd, a user could inject HTML through SaaS signup inputs. The user who injected the unsafe HTML code would only affect themselves and would not affect other users. Commit 5d118a902872d7941f099ad1fb918e2421e79ccd patches this bug." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 1.2, "baseSeverity": "LOW", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "LOW", "userInteraction": "ACTIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:U", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-23T15:45:12.348Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/frappe/press/security/advisories/GHSA-rf69-h96f-rf2j", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/frappe/press/security/advisories/GHSA-rf69-h96f-rf2j" }, { "name": "https://github.com/frappe/press/commit/5d118a902872d7941f099ad1fb918e2421e79ccd", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/frappe/press/commit/5d118a902872d7941f099ad1fb918e2421e79ccd" } ], "source": { "advisory": "GHSA-rf69-h96f-rf2j", "discovery": "UNKNOWN" }, "title": "Frappe Press possible HTML injection through SaaS Signup inputs" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-49751", "datePublished": "2024-10-23T15:45:12.348Z", "dateReserved": "2024-10-18T13:43:23.451Z", "dateUpdated": "2024-10-23T16:27:13.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }