CVE-2025-65924
Unknown Unknown - Not Provided
HTML Injection in ERPNext PDF Generation Enables Phishing Links

Publication date: 2026-02-03

Last updated on: 2026-02-17

Assigner: MITRE

Description
ERPNext thru 15.88.1 does not sanitize or remove certain HTML tags specifically `<a>` hyperlinks in fields that are intended for plain text. Although JavaScript is blocked (preventing XSS), the HTML is still preserved in the generated PDF document. As a result, an attacker can inject malicious clickable links into an ERP-generated PDF. Since PDF files generated by the ERP system are generally considered trustworthy, users are highly likely to click these links, potentially enabling phishing attacks or malware delivery. This issue occurs in the Add Quality Goal' function.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-03
Last Modified
2026-02-17
Generated
2026-05-07
AI Q&A
2026-02-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
frappe erpnext to 15.88.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-80 The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in ERPNext versions up to 15.88.1 where the system does not properly sanitize or remove certain HTML tags, specifically <a> hyperlinks, in fields that are supposed to contain only plain text.

Although JavaScript is blocked to prevent cross-site scripting (XSS), the HTML links remain intact in the PDF documents generated by the ERP system.

Because these PDFs are generally trusted by users, an attacker can inject malicious clickable links into them, potentially leading to phishing attacks or malware delivery.

This issue occurs specifically in the 'Add Quality Goal' function of ERPNext.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing attackers to inject malicious clickable links into PDF documents generated by the ERP system.

Since these PDFs are generally trusted, users may click on these links, which could lead to phishing attacks or the delivery of malware.

This can compromise user security, potentially leading to credential theft, unauthorized access, or system infection.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart