{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T10:20:31.390","vulnerabilities":[{"cve":{"id":"CVE-2024-34074","sourceIdentifier":"security-advisories@github.com","published":"2024-05-14T15:38:27.850","lastModified":"2025-08-04T14:37:59.307","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Frappe is a full-stack web application framework. Prior to 15.26.0 and 14.74.0, the login page accepts redirect argument and it allowed redirect to untrusted external URls. This behaviour can be used by malicious actors for phishing. This vulnerability is fixed in 15.26.0 and 14.74.0."},{"lang":"es","value":"Frappe es un framework de aplicación web completo. Antes de 15.26.0 y 14.74.0, la página de inicio de sesión acepta el argumento de redireccionamiento y permitía el redireccionamiento a URL externas que no son de confianza. Este comportamiento puede ser utilizado por actores malintencionados para realizar phishing. Esta vulnerabilidad se solucionó en 15.26.0 y 14.74.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-601"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*","versionEndExcluding":"14.74.0","matchCriteriaId":"5CDB27F1-D6D1-486B-8E1A-42DCF4443970"},{"vulnerable":true,"criteria":"cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.26.0","matchCriteriaId":"FA6B4D88-2321-491D-B015-28ACA6C6DBFC"}]}]}],"references":[{"url":"https://github.com/frappe/frappe/commit/65b3c42635038cdff17d3109be6c373bac004829","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/frappe/frappe/pull/26304","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/frappe/frappe/security/advisories/GHSA-7g27-q225-j894","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/frappe/frappe/commit/65b3c42635038cdff17d3109be6c373bac004829","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/frappe/frappe/pull/26304","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/frappe/frappe/security/advisories/GHSA-7g27-q225-j894","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}