CVE-2025-10655
BaseFortify
Publication date: 2025-12-09
Last updated on: 2026-04-14
Assigner: Fluid Attacks
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| frappe | helpdesk | 1.14.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a SQL Injection in Frappe HelpDesk version 1.14.0. It occurs in the dashboard function get_dashboard_data because user-controlled parameters are unsafely concatenated into dynamic SQL statements, allowing an attacker to manipulate the SQL query.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with limited privileges to execute arbitrary SQL commands on the database, potentially leading to unauthorized data access, data modification, or disruption of service.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows attackers to perform SQL Injection and potentially exfiltrate sensitive data such as password reset tokens, which could lead to unauthorized access to user accounts and exposure of personal data. This kind of data breach can negatively impact compliance with data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive information against unauthorized access and breaches. Therefore, the vulnerability poses a risk to maintaining compliance with these standards unless properly mitigated by applying the patch and securing the application. [3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by testing the POST endpoint `/api/method/helpdesk.api.dashboard.get_dashboard_data` for SQL Injection by injecting payloads into the `filters.team` and `filters.agent` parameters. Proof-of-concept commands include sending specially crafted POST requests with SQL injection payloads such as `OR SLEEP(3)`, `OR 1=1`, or error-based payloads to observe time delays, boolean logic manipulation, or error messages indicating injection success. These tests require authentication as a user with the "Agent Manager" role or higher. Specific commands involve crafting HTTP POST requests to the vulnerable endpoint with these payloads in the JSON body to confirm exploitation. [3]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade Frappe Helpdesk to the patched version that includes the fix for this vulnerability. The fix involves refactoring the dashboard API to use parameterized queries via the Query Builder instead of unsafe string concatenation, and restructuring the code to improve security and maintainability. Until the upgrade is applied, restrict access to the vulnerable endpoint to trusted users only, and monitor for suspicious activity. Applying the official patch from the Frappe Helpdesk GitHub repository is essential to fully remediate the issue. [1, 3]