CVE-2026-39352
Path Traversal Vulnerability in Frappe Framework
Publication date: 2026-05-20
Last updated on: 2026-05-20
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| frappe | frappe | to 15.105.0 (exc) |
| frappe | frappe | to 16.15.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how the arbitrary file read vulnerability in Frappe Framework impacts compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
CVE-2026-39352 is a critical security vulnerability in the Frappe Framework that allows an attacker to perform an arbitrary file read via path traversal. This means that an attacker can potentially access files on the server that they should not be able to read by manipulating file path inputs.
The vulnerability affects versions of Frappe prior to 15.105.0 and 16.15.0 and has been fixed in versions 15.105.0 and 16.15.0 and above.
How can this vulnerability impact me? :
This vulnerability can have a critical impact as it allows unauthorized reading of arbitrary files on the server running the Frappe Framework. This could lead to exposure of sensitive information such as configuration files, credentials, or other private data stored on the server.
Since the vulnerability requires no privileges or user interaction, it can be exploited remotely, increasing the risk of data breaches or further attacks.
To mitigate this risk, users must upgrade to Frappe versions 15.105.0 or 16.15.0 and above where the issue has been patched.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the CVE-2026-39352 vulnerability, you should upgrade the Frappe Framework to version 16.15.0 or 15.105.0 or above, as these versions contain the patch that fixes the arbitrary file read via path traversal issue.
There are no available workarounds for this vulnerability, so upgrading is the only effective immediate step.