Cyber Posture

CVE-2025-65267

Critical

Published: 03 December 2025

Published
03 December 2025
Modified
05 December 2025
KEV Added
Patch
CVSS Score 9.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0004 11.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-65267, published on 2025-12-03, is a stored cross-site scripting (XSS) vulnerability (CWE-79) affecting ERPNext version 15.83.2 and Frappe Framework version 15.86.0. The issue arises from improper validation of uploaded SVG avatar images, which allows attackers to embed malicious JavaScript payloads within these files.

An attacker with low-privilege network access (PR:L) can exploit this by uploading a specially crafted SVG avatar containing JavaScript. The payload remains stored and executes only when an administrator clicks the image link to view the avatar, requiring user interaction (UI:R) but enabling a scoped impact (S:C). Successful exploitation can result in high confidentiality, integrity, and availability impacts (C:H/I:H/A:H), potentially leading to administrator account takeover, privilege escalation, or full compromise of the affected ERPNext instance. The vulnerability carries a CVSS v3.1 base score of 9.0 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).

Mitigation details and potential patches can be found in the referenced advisories, including the proof-of-concept repository at https://github.com/PhDg1410/CVE/tree/main/CVE-2025-65267 and the official project repositories at https://github.com/frappe/erpnext and https://github.com/frappe/frappe.

Details

CWE(s)
CWE-79

Affected Products

frappe
erpnext
15.83.2
frappe
frappe
15.86.0

MITRE ATT&CK Enterprise Techniques

T1027.017 SVG Smuggling Stealth
Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign SVG files.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The improper validation of uploaded SVG images enables SVG Smuggling (T1027.017) by embedding malicious JavaScript for stored XSS execution upon admin viewing, facilitating exploitation of the public-facing ERPNext/Frappe web application (T1190).

References