Cyber Posture

CVE-2026-28436

High

Published: 05 March 2026

Published
05 March 2026
Modified
09 March 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
EPSS Score 0.0004 13.2th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28436 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Frappe Frappe. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-79

Penetration testing submits XSS payloads to web applications, detecting cross-site scripting flaws for subsequent remediation.

addresses: CWE-79

Validates web inputs to reject script-related content that could produce XSS.

addresses: CWE-79

Output validation against expected content can reject or sanitize script content in generated web pages, reducing XSS exploitability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Stored XSS in public Frappe web app directly enables remote exploitation of the application (T1190) and arbitrary JavaScript execution in user browsers when avatars/comments are viewed (T1059.007).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Frappe is a full-stack web application framework. Prior to versions 16.11.0 and 15.102.0, an attacker can set a crafted image URL that results in XSS when the avatar is displayed, and it can be triggered for other users via website…

more

page comments. This issue has been patched in versions 16.11.0 and 15.102.0.

Deeper analysisAI

CVE-2026-28436 is a cross-site scripting (XSS) vulnerability, classified under CWE-79, in the Frappe full-stack web application framework. It affects versions prior to 16.11.0 and 15.102.0, where an attacker can set a crafted image URL that triggers XSS when the avatar is displayed.

The vulnerability enables an unauthenticated attacker (PR:N) to exploit it remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N), earning a CVSS v3.1 base score of 7.2 due to changed scope (S:C) and low impacts on confidentiality and integrity (C:L/I:L/A:N). By crafting a malicious image URL, the attacker can cause XSS execution for other users when they view website page comments displaying the affected avatar.

Frappe has addressed this issue in versions 16.11.0 and 15.102.0. Additional mitigation details are available in the security advisory at https://github.com/frappe/frappe/security/advisories/GHSA-vm63-r48g-7wqh.

Details

CWE(s)

Affected Products

frappe
frappe
≤ 15.102.0 · 16.0.0 — 16.11.0

CVEs Like This One

CVE-2026-39351Same product: Frappe Frappe
CVE-2026-35614Same product: Frappe Frappe
CVE-2025-30212Same product: Frappe Frappe
CVE-2025-68929Same product: Frappe Frappe
CVE-2025-65267Same product: Frappe Frappe
CVE-2025-30217Same product: Frappe Frappe
CVE-2026-31877Same product: Frappe Frappe
CVE-2025-30213Same product: Frappe Frappe
CVE-2025-30214Same product: Frappe Frappe
CVE-2025-68953Same product: Frappe Frappe

References