Safety vulnerability ID: 65296
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and a tightly integrated client side library. Prior to versions 14.59.0 and 15.5.0, portal pages are susceptible to Cross-Site Scripting (XSS) which can be used to inject malicious JS code if user clicks on a malicious link. This vulnerability has been patched in versions 14.59.0 and 15.5.0. No known workarounds are available. See CVE-2024-24812.
Latest version: 0.0.1
Frappe placeholder package
Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and a tightly integrated client side library. Prior to versions 14.59.0 and 15.5.0, portal pages are susceptible to Cross-Site Scripting (XSS) which can be used to inject malicious JS code if user clicks on a malicious link. This vulnerability has been patched in versions 14.59.0 and 15.5.0. No known workarounds are available. See CVE-2024-24812.
MISC:https://github.com/frappe/frappe/releases/tag/v14.59.0: https://github.com/frappe/frappe/releases/tag/v14.59.0
MISC:https://github.com/frappe/frappe/releases/tag/v15.5.0: https://github.com/frappe/frappe/releases/tag/v15.5.0
MISC:https://github.com/frappe/frappe/security/advisories/GHSA-7p3m-h76m-hg9v: https://github.com/frappe/frappe/security/advisories/GHSA-7p3m-h76m-hg9v
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application