CVE-2025-10655
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2026-04-14

Assigner: Fluid Attacks

Description
SQL Injection in Frappe HelpDesk in the dashboard get_dashboard_data due to unsafe concatenation of user-controlled parameters into dynamic SQL statements.This issue affects Frappe HelpDesk: 1.14.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2026-04-14
Generated
2026-05-06
AI Q&A
2025-12-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
frappe helpdesk 1.14.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a SQL Injection in Frappe HelpDesk version 1.14.0. It occurs in the dashboard function get_dashboard_data because user-controlled parameters are unsafely concatenated into dynamic SQL statements, allowing an attacker to manipulate the SQL query.


How can this vulnerability impact me? :

This vulnerability can allow an attacker with limited privileges to execute arbitrary SQL commands on the database, potentially leading to unauthorized data access, data modification, or disruption of service.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows attackers to perform SQL Injection and potentially exfiltrate sensitive data such as password reset tokens, which could lead to unauthorized access to user accounts and exposure of personal data. This kind of data breach can negatively impact compliance with data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive information against unauthorized access and breaches. Therefore, the vulnerability poses a risk to maintaining compliance with these standards unless properly mitigated by applying the patch and securing the application. [3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the POST endpoint `/api/method/helpdesk.api.dashboard.get_dashboard_data` for SQL Injection by injecting payloads into the `filters.team` and `filters.agent` parameters. Proof-of-concept commands include sending specially crafted POST requests with SQL injection payloads such as `OR SLEEP(3)`, `OR 1=1`, or error-based payloads to observe time delays, boolean logic manipulation, or error messages indicating injection success. These tests require authentication as a user with the "Agent Manager" role or higher. Specific commands involve crafting HTTP POST requests to the vulnerable endpoint with these payloads in the JSON body to confirm exploitation. [3]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Frappe Helpdesk to the patched version that includes the fix for this vulnerability. The fix involves refactoring the dashboard API to use parameterized queries via the Query Builder instead of unsafe string concatenation, and restructuring the code to improve security and maintainability. Until the upgrade is applied, restrict access to the vulnerable endpoint to trusted users only, and monitor for suspicious activity. Applying the official patch from the Frappe Helpdesk GitHub repository is essential to fully remediate the issue. [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart