CVE-2025-52898

Frappe is a full-stack web application framework. Prior to versions 14.94.3 and 15.58.0, a carefully crafted request could lead to a malicious actor getting access to a user's password reset token. This can only be exploited on self hosted instances configured in a certain way. Frappe Cloud users are safe. This issue has been patched in versions 14.94.3 and 15.58.0. Workarounds for this issue involve verifying password reset URLs before clicking on them or upgrading for self hosted users.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*
cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*

History

08 Jul 2025, 14:43

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-30 18:15

Updated : 2025-07-08 14:43


NVD link : CVE-2025-52898

Mitre link : CVE-2025-52898

CVE.ORG link : CVE-2025-52898


JSON object : View

Products Affected

frappe

  • frappe
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor