Frappe Framework ERPNext 13.4.0 contains a sandbox escape vulnerability in RestrictedPython that allows authenticated users with System Manager role to execute arbitrary code by exploiting frame introspection. Attackers can create a server script via the /app/server-script endpoint and access the gi_frame attribute to traverse the call stack and invoke os.popen to execute system commands.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 05 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Frappe Framework ERPNext 13.4.0 contains a sandbox escape vulnerability in RestrictedPython that allows authenticated users with System Manager role to execute arbitrary code by exploiting frame introspection. Attackers can create a server script via the /app/server-script endpoint and access the gi_frame attribute to traverse the call stack and invoke os.popen to execute system commands. | |
| Title | Frappe Framework ERPNext 13.4.0 Remote Code Execution | |
| First Time appeared |
Erpnext
Erpnext erpnext |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:erpnext:erpnext:13.4.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Erpnext
Erpnext erpnext |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-05T12:25:34.862Z
Reserved: 2026-01-10T01:51:52.984Z
Link: CVE-2023-54345
No data.
No data.
No data.
OpenCVE Enrichment
No data.
Weaknesses