Frappe Framework ERPNext 13.4.0 contains a sandbox escape vulnerability in RestrictedPython that allows authenticated users with System Manager role to execute arbitrary code by exploiting frame introspection. Attackers can create a server script via the /app/server-script endpoint and access the gi_frame attribute to traverse the call stack and invoke os.popen to execute system commands.
Metrics
Affected Vendors & Products
References
History
Tue, 05 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Frappe Framework ERPNext 13.4.0 contains a sandbox escape vulnerability in RestrictedPython that allows authenticated users with System Manager role to execute arbitrary code by exploiting frame introspection. Attackers can create a server script via the /app/server-script endpoint and access the gi_frame attribute to traverse the call stack and invoke os.popen to execute system commands. | |
| Title | Frappe Framework ERPNext 13.4.0 Remote Code Execution | |
| First Time appeared |
Erpnext
Erpnext erpnext |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:erpnext:erpnext:13.4.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Erpnext
Erpnext erpnext |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-05T12:25:34.862Z
Reserved: 2026-01-10T01:51:52.984Z
Link: CVE-2023-54345
Updated: 2026-05-05T12:25:29.288Z
Status : Received
Published: 2026-05-05T12:16:16.850
Modified: 2026-05-05T12:16:16.850
Link: CVE-2023-54345
No data.
OpenCVE Enrichment
Updated: 2026-05-05T13:00:07Z