Beware: ERPNext v15.53.1 Vulnerability Lets Hackers Crash the Party with XSS!
Beware: ERPNext v15.53.1 has a vulnerability that allows an evil twist on selfies! An authenticated user can inject malicious JavaScript into the user_image field, executing scripts like a prankster with a flair for cyber mischief. Remember, with great power comes great responsibility… and potential JavaScript chaos!

Hot Take:
Oh, ERPNext, you’ve gone and done it again! Just when we thought our images were safe, you’ve turned them into a Trojan horse of code chaos. Who knew a little selfie could cause so much drama? It’s like finding out the harmless family photo album is actually a horror movie in disguise. Keep those profile pics squeaky clean, folks!
Key Points:
- An authenticated user can exploit the user_image field in ERPNext v15.53.1.
- The vulnerability allows malicious JavaScript injection via the image path.
- This XSS flaw affects other authenticated users by executing the stored script.
- The issue arises due to insufficient sanitization of input data.
- A Proof of Concept attack can be executed with a simple POST request.
Already a member? Log in here