Cyber Posture

CVE-2026-31877

Critical

Published: 11 March 2026

Published
11 March 2026
Modified
13 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0007 22.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-31877 is a critical-severity SQL Injection (CWE-89) vulnerability in Frappe Frappe. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 22.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the CVE by requiring identification, prioritization, and remediation of the SQL injection flaw through patching to Frappe versions 15.84.0 or 14.99.0.

prevent

Prevents SQL injection exploitation by enforcing validation of untrusted inputs to the vulnerable web application endpoint using organization-defined tools and procedures.

preventdetect

Boundary protection with web application firewalls inspects and blocks crafted requests containing SQL injection payloads targeting the endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing Frappe web framework directly enables remote unauthenticated exploitation (T1190); arbitrary SQL queries facilitate collection/manipulation of database contents (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Frappe is a full-stack web application framework. Prior to 15.84.0 and 14.99.0, a specially crafted request made to a certain endpoint could result in SQL injection, allowing an attacker to extract information they wouldn't otherwise be able to. This vulnerability…

more

is fixed in 15.84.0 and 14.99.0.

Deeper analysisAI

CVE-2026-31877 is a SQL injection vulnerability (CWE-89) affecting Frappe, a full-stack web application framework. Versions prior to 15.84.0 and 14.99.0 are vulnerable, where a specially crafted request to a certain endpoint allows attackers to execute arbitrary SQL queries. The issue has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact exploitation.

The vulnerability can be exploited remotely by unauthenticated attackers over the network with low complexity and no user interaction required. Successful exploitation enables attackers to extract sensitive information from the database that would otherwise be inaccessible, potentially compromising confidentiality, integrity, and availability of affected systems.

The official GitHub security advisory (GHSA-2c4m-999q-xhx4) confirms the vulnerability and states it is fixed in Frappe versions 15.84.0 and 14.99.0. Security practitioners should upgrade to these patched versions immediately to mitigate the risk.

Details

CWE(s)

Affected Products

frappe
frappe
≤ 14.99.0 · 15.0.0 — 15.84.0

CVEs Like This One

CVE-2025-30217Same product: Frappe Frappe
CVE-2026-35614Same product: Frappe Frappe
CVE-2026-29081Same product: Frappe Frappe
CVE-2025-30212Same product: Frappe Frappe
CVE-2026-39351Same product: Frappe Frappe
CVE-2025-68929Same product: Frappe Frappe
CVE-2025-30213Same product: Frappe Frappe
CVE-2025-30214Same product: Frappe Frappe
CVE-2026-28436Same product: Frappe Frappe
CVE-2025-68953Same product: Frappe Frappe

References