The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-30212

CVE-2025-30212: Frappe Framework SQLi Vulnerability

CVE-2025-30212 is an SQL injection vulnerability in Frappe Framework that allows attackers to access sensitive information. This article covers the technical details, affected versions, security impact, and mitigation.

Published: April 29, 2026

CVE-2025-30212 Overview

An SQL Injection vulnerability has been identified in Frappe Framework, a full-stack web application framework. This security flaw allows malicious actors to inject arbitrary SQL commands through the application, potentially enabling unauthorized access to sensitive information stored in the database. The vulnerability affects versions prior to 14.89.0 and 15.51.0.

Critical Impact

Attackers can exploit this SQL Injection vulnerability to extract sensitive data from the database without authentication, potentially compromising confidential business information, user credentials, and other protected data stored within Frappe-based applications.

Affected Products

  • Frappe Framework versions prior to 14.89.0 (v14 branch)
  • Frappe Framework versions prior to 15.51.0 (v15 branch)
  • All Frappe-based applications including ERPNext running vulnerable framework versions

Discovery Timeline

  • 2025-03-25 - CVE-2025-30212 published to NVD
  • 2025-08-01 - Last updated in NVD database

Technical Details for CVE-2025-30212

Vulnerability Analysis

This SQL Injection vulnerability (CWE-89) in Frappe Framework allows attackers to manipulate database queries through improperly sanitized user input. SQL Injection occurs when an application incorporates user-controlled data into SQL queries without adequate validation or parameterization, enabling attackers to modify query logic and access unauthorized data.

The vulnerability is exploitable over the network without requiring authentication or user interaction, making it particularly concerning for publicly accessible Frappe deployments. Successful exploitation enables attackers to read sensitive information from the database, though integrity and availability impacts appear limited based on the vulnerability characteristics.

Root Cause

The root cause stems from insufficient input validation and sanitization in the Frappe Framework's data handling routines. User-supplied input is being incorporated into SQL queries without proper parameterization or escaping, allowing specially crafted input to break out of the intended query structure and execute arbitrary SQL commands.

The patches released by Frappe include updates to various components including frappe/desk/form/load.py which now imports clean_email_html from frappe.utils.html_utils, suggesting additional input sanitization was implemented as part of the security fixes.

Attack Vector

The attack vector is network-based, allowing remote attackers to exploit the vulnerability without prior authentication. Attackers can craft malicious requests containing SQL injection payloads targeting vulnerable input fields or parameters within the Frappe application.

The following patch shows part of the security updates applied to address vulnerabilities in the v15 and v14 branches:

python
from frappe.model.utils.user_settings import get_user_settings
from frappe.permissions import get_doc_permissions
from frappe.utils.data import cstr
+from frappe.utils.html_utils import clean_email_html


@frappe.whitelist()

Source: GitHub Commit Fix

Detection Methods for CVE-2025-30212

Indicators of Compromise

  • Unusual database queries in application logs containing SQL syntax characters such as single quotes, semicolons, or SQL keywords like UNION, SELECT, or DROP
  • Error messages in web server logs indicating SQL syntax errors or database exceptions
  • Unexpected data access patterns or large data exfiltration from the database
  • Authentication bypasses or unauthorized access to administrative functions

Detection Strategies

  • Implement Web Application Firewall (WAF) rules to detect and block common SQL injection patterns in HTTP requests
  • Enable detailed logging for the Frappe application and database to capture suspicious query activity
  • Deploy database activity monitoring to identify anomalous queries that deviate from normal application behavior
  • Utilize intrusion detection systems (IDS) with signatures for SQL injection attack patterns

Monitoring Recommendations

  • Monitor Frappe application logs for error messages containing database-related exceptions
  • Set up alerts for unusual database query patterns or unauthorized data access attempts
  • Track authentication events and flag any anomalies that may indicate exploitation attempts
  • Review web server access logs for requests containing suspicious URL-encoded SQL injection payloads

How to Mitigate CVE-2025-30212

Immediate Actions Required

  • Upgrade Frappe Framework to version 14.89.0 or later for v14 deployments
  • Upgrade Frappe Framework to version 15.51.0 or later for v15 deployments
  • Review database access logs for signs of prior exploitation
  • Consider temporarily restricting network access to Frappe instances until patches are applied

Patch Information

Frappe has released security patches that address this vulnerability in both the v14 and v15 branches. The fixes are available through the following commits:

  • Version 15 fix: GitHub Commit Update (PR #28897)
  • Version 14 fix: GitHub Commit Fix (PR #28898)

For complete details, refer to the GitHub Security Advisory.

Workarounds

  • No official workarounds are available for this vulnerability; upgrading is the only remediation option
  • Deploy a Web Application Firewall (WAF) with SQL injection protection as a temporary mitigation layer
  • Restrict network access to the Frappe application to trusted IP addresses or VPN connections
  • Enable database audit logging to detect potential exploitation attempts while awaiting patch deployment
bash
# Upgrade Frappe Framework to patched version
# For version 14.x deployments:
bench update --branch version-14-hotfix
bench migrate

# For version 15.x deployments:
bench update --branch version-15-hotfix
bench migrate

# Verify the installed version after upgrade
bench version

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeSQLI

  • Vendor/TechFrappe

  • SeverityMEDIUM

  • CVSS Score6.6

  • EPSS Probability0.14%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-89
  • Vendor Resources
  • GitHub Commit Update

  • GitHub Commit Fix

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-35614: Frappe Framework SQL Injection Vulnerability

  • CVE-2026-31877: Frappe Framework SQL Injection Vulnerability

  • CVE-2026-29081: Frappe Framework SQLi Vulnerability

  • CVE-2025-66205: Frappe Framework SQL Injection Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English