Description
An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The order_by parameter can be used to perform an SQL injection attack. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-15671 | An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The order_by parameter can be used to perform an SQL injection attack. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required. |
References
History
Fri, 08 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Frappe
Frappe erpnext |
|
| CPEs | cpe:2.3:a:frappe:erpnext:10.1.6:*:*:*:*:*:*:* | |
| Vendors & Products |
Erpnext
Erpnext erpnext |
Frappe
Frappe erpnext |
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-09-16T22:20:49.348Z
Reserved: 2018-01-02T00:00:00.000Z
Link: CVE-2018-3885
No data.
Status : Modified
Published: 2018-09-12T14:29:01.640
Modified: 2026-05-08T15:47:30.850
Link: CVE-2018-3885
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD