A Stored Cross-Site Scripting (XSS) vulnerability was discovered within the CSV import mechanism of ERPNext thru 15.88.1 when using the Update Existing Recordsoption. An attacker can embed malicious JavaScript code into a CSV field, which is then stored in the database and executed whenever the affected record is viewed by a user within the ERPNext web interface. This exposure may allow an attacker to compromise user sessions or perform unauthorized actions under the context of a victim's account.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/frappe/frappe_docker.git |
|
History
Tue, 03 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Stored Cross-Site Scripting (XSS) vulnerability was discovered within the CSV import mechanism of ERPNext thru 15.88.1 when using the Update Existing Recordsoption. An attacker can embed malicious JavaScript code into a CSV field, which is then stored in the database and executed whenever the affected record is viewed by a user within the ERPNext web interface. This exposure may allow an attacker to compromise user sessions or perform unauthorized actions under the context of a victim's account. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-03T17:40:12.435Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65923
No data.
Status : Received
Published: 2026-02-03T18:16:15.700
Modified: 2026-02-03T18:16:15.700
Link: CVE-2025-65923
No data.
OpenCVE Enrichment
No data.