Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, certain requests were vulnerable to path traversal attacks, wherein some files from the server could be retrieved if the full path was known. Sites hosted on Frappe Cloud, and even other setups that are behind a reverse proxy like NGINX are unaffected. This would mainly affect someone directly using werkzeug/gunicorn. In those cases, either an upgrade or changing the setup to use a reverse proxy is recommended. This vulnerability is fixed in 15.86.0 and 14.99.2.
Cite this page
CVE-2025-66206. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2025-66206
Use CWE-22, Frappe vendor hub and Frappe product page to widen CVE-2025-66206 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-35614, CVE-2026-31877 and CVE-2026-31017 for nearby disclosures in the same product family.