An exploited vulnerability in ERPNext v15.53.1 allows authenticated users to perform stored XSS attacks through the user_image field on user profiles. This flaw enables malicious scripts to execute in othersβ browsers, potentially compromising security. #ERPNext #XSSvulnerability
Keypoints
- An XSS vulnerability exists due to insufficient sanitization of the user_image field in ERPNext v15.53.1.
- Authenticated users can inject malicious JavaScript code via the file path or HTML context.
- The exploit uses a crafted image path that executes scripts when rendered by other users.
- The vulnerability allows stored script execution, increasing the potential impact.
- The issue was disclosed publicly on the Full Disclosure mailing list and detailed in a proof of concept.