Stored XSS Vulnerability in ERPNext v15.53.1 Allows Script Execution via user_image Field

Stored XSS Vulnerability in ERPNext v15.53.1 Allows Script Execution via user_image Field

An exploited vulnerability in ERPNext v15.53.1 allows authenticated users to perform stored XSS attacks through the user_image field on user profiles. This flaw enables malicious scripts to execute in others’ browsers, potentially compromising security. #ERPNext #XSSvulnerability

Keypoints

  • An XSS vulnerability exists due to insufficient sanitization of the user_image field in ERPNext v15.53.1.
  • Authenticated users can inject malicious JavaScript code via the file path or HTML context.
  • The exploit uses a crafted image path that executes scripts when rendered by other users.
  • The vulnerability allows stored script execution, increasing the potential impact.
  • The issue was disclosed publicly on the Full Disclosure mailing list and detailed in a proof of concept.

Read More: https://seclists.org/fulldisclosure/2025/Jun/10