CVE-2025-65924
HTML Injection in ERPNext PDF Generation Enables Phishing Links
Publication date: 2026-02-03
Last updated on: 2026-02-17
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| frappe | erpnext | to 15.88.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-80 | The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in ERPNext versions up to 15.88.1 where the system does not properly sanitize or remove certain HTML tags, specifically <a> hyperlinks, in fields that are supposed to contain only plain text.
Although JavaScript is blocked to prevent cross-site scripting (XSS), the HTML links remain intact in the PDF documents generated by the ERP system.
Because these PDFs are generally trusted by users, an attacker can inject malicious clickable links into them, potentially leading to phishing attacks or malware delivery.
This issue occurs specifically in the 'Add Quality Goal' function of ERPNext.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing attackers to inject malicious clickable links into PDF documents generated by the ERP system.
Since these PDFs are generally trusted, users may click on these links, which could lead to phishing attacks or the delivery of malware.
This can compromise user security, potentially leading to credential theft, unauthorized access, or system infection.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know