In ERPNext v15.83.2 and Frappe Framework v15.86.0, improper validation of uploaded SVG avatar images allows attackers to embed malicious JavaScript. The payload executes when an administrator clicks the image link to view the avatar, resulting in stored cross-site scripting (XSS). Successful exploitation may lead to account takeover, privilege escalation, or full compromise of the affected ERPNext instance.
Cite this page
CVE-2025-65267. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2025-65267
Use CWE-79, Frappe vendor hub and Erpnext product page to widen CVE-2025-65267 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-67289, CVE-2026-27471 and CVE-2026-31017 for nearby disclosures in the same product family.