Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 26 Feb 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:frappe:erpnext:*:*:*:*:*:*:*:* cpe:2.3:a:frappe:erpnext:16.0.0:-:*:*:*:*:*:* cpe:2.3:a:frappe:erpnext:16.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:frappe:erpnext:16.0.0:rc2:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Frappe
Frappe erpnext |
|
| Vendors & Products |
Frappe
Frappe erpnext |
Sat, 21 Feb 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ERP is a free and open source Enterprise Resource Planning tool. In versions up to 15.98.0 and 16.0.0-rc.1 and through 16.6.0, certain endpoints lacked access validation which allowed for unauthorized document access. This issue has been fixed in versions 15.98.1 and 16.6.1. | |
| Title | ERP: Document access through endpoints due to missing validation | |
| Weaknesses | CWE-284 CWE-306 CWE-862 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-24T18:53:57.291Z
Reserved: 2026-02-19T17:25:31.101Z
Link: CVE-2026-27471
Updated: 2026-02-24T18:53:50.392Z
Status : Analyzed
Published: 2026-02-21T07:16:13.580
Modified: 2026-02-24T14:52:50.073
Link: CVE-2026-27471
No data.
OpenCVE Enrichment
Updated: 2026-04-18T11:30:44Z