Cyber Posture

CVE-2025-65267

Critical

Published: 03 December 2025

Published
03 December 2025
Modified
05 December 2025
KEV Added
Patch
CVSS Score 9.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0004 11.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-65267 is a critical-severity Cross-site Scripting (CWE-79) vulnerability in Frappe Erpnext. Its CVSS base score is 9.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique SVG Smuggling (T1027.017); ranked at the 11.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to SVG Smuggling (T1027.017) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the improper validation of uploaded SVG avatar images by enforcing input validation mechanisms to block malicious JavaScript payloads.

prevent

Prevents execution of stored XSS payloads by filtering information output when administrators view the malicious avatar images.

prevent

Mitigates the vulnerability by implementing malicious code protection mechanisms at upload entry points to detect and block JavaScript embedded in SVG files.

MITRE ATT&CK Enterprise TechniquesAI

T1027.017 SVG Smuggling Stealth
Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign SVG files.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The improper validation of uploaded SVG images enables SVG Smuggling (T1027.017) by embedding malicious JavaScript for stored XSS execution upon admin viewing, facilitating exploitation of the public-facing ERPNext/Frappe web application (T1190).

NVD Description

In ERPNext v15.83.2 and Frappe Framework v15.86.0, improper validation of uploaded SVG avatar images allows attackers to embed malicious JavaScript. The payload executes when an administrator clicks the image link to view the avatar, resulting in stored cross-site scripting (XSS).…

more

Successful exploitation may lead to account takeover, privilege escalation, or full compromise of the affected ERPNext instance.

Deeper analysisAI

CVE-2025-65267, published on 2025-12-03, is a stored cross-site scripting (XSS) vulnerability (CWE-79) affecting ERPNext version 15.83.2 and Frappe Framework version 15.86.0. The issue arises from improper validation of uploaded SVG avatar images, which allows attackers to embed malicious JavaScript payloads within these files.

An attacker with low-privilege network access (PR:L) can exploit this by uploading a specially crafted SVG avatar containing JavaScript. The payload remains stored and executes only when an administrator clicks the image link to view the avatar, requiring user interaction (UI:R) but enabling a scoped impact (S:C). Successful exploitation can result in high confidentiality, integrity, and availability impacts (C:H/I:H/A:H), potentially leading to administrator account takeover, privilege escalation, or full compromise of the affected ERPNext instance. The vulnerability carries a CVSS v3.1 base score of 9.0 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).

Mitigation details and potential patches can be found in the referenced advisories, including the proof-of-concept repository at https://github.com/PhDg1410/CVE/tree/main/CVE-2025-65267 and the official project repositories at https://github.com/frappe/erpnext and https://github.com/frappe/frappe.

Details

CWE(s)

Affected Products

frappe
erpnext
15.83.2
frappe
frappe
15.86.0

CVEs Like This One

CVE-2025-67289Same product: Frappe Erpnext
CVE-2026-28436Same product: Frappe Frappe
CVE-2026-31017Same product: Frappe Erpnext
CVE-2026-39351Same product: Frappe Frappe
CVE-2026-35614Same product: Frappe Frappe
CVE-2025-30212Same product: Frappe Frappe
CVE-2025-68929Same product: Frappe Frappe
CVE-2025-66434Same product: Frappe Erpnext
CVE-2025-30217Same product: Frappe Frappe
CVE-2026-31877Same product: Frappe Frappe

References