{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T14:36:05.666","vulnerabilities":[{"cve":{"id":"CVE-2023-46127","sourceIdentifier":"security-advisories@github.com","published":"2023-10-23T15:15:09.313","lastModified":"2024-11-21T08:27:56.190","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and an integrated client side library. A malicious Frappe user with desk access could create documents containing HTML payloads allowing HTML Injection. This vulnerability has been patched in version 14.49.0."},{"lang":"es","value":"Frappe es un framework de aplicación web completo que utiliza Python y MariaDB en el lado del servidor y una librería integrada en el lado del cliente. Un usuario malicioso de Frappe con acceso al escritorio podría crear documentos que contengan cargas HTML que permitan la inyección de HTML. Esta vulnerabilidad ha sido parcheada en la versión 14.49.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*","versionEndExcluding":"14.49.0","matchCriteriaId":"94A420A9-14D7-4416-96EC-AF18CD78BF09"}]}]}],"references":[{"url":"https://github.com/frappe/frappe/commit/3dc5d2fcc7561dde181ba953009fe6e39d64e900","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/frappe/frappe/pull/22339","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/frappe/frappe/security/advisories/GHSA-j2w9-8xrr-7g98","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/frappe/frappe/commit/3dc5d2fcc7561dde181ba953009fe6e39d64e900","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/frappe/frappe/pull/22339","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https://github.com/frappe/frappe/security/advisories/GHSA-j2w9-8xrr-7g98","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}