CVE-2023-54345
Severity CVSS v4.0:
HIGH
Type:
CWE-94
Code Injection
Publication date:
05/05/2026
Last modified:
05/05/2026
Description
Frappe Framework ERPNext 13.4.0 contains a sandbox escape vulnerability in RestrictedPython that allows authenticated users with System Manager role to execute arbitrary code by exploiting frame introspection. Attackers can create a server script via the /app/server-script endpoint and access the gi_frame attribute to traverse the call stack and invoke os.popen to execute system commands.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:frappe:erpnext:13.4.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://erpnext.org
- https://frappeframework.com/docs/v13/user/en/desk/scripting/server-script
- https://gist.github.com/lebr0nli/c2fc617390451f0e5a4c31c87d8720b6
- https://github.com/frappe/frappe/
- https://github.com/frappe/frappe/blob/v13.4.0/frappe/utils/safe_exec.py#L42
- https://ur4ndom.dev/posts/2023-07-02-uiuctf-rattler-read/
- https://www.exploit-db.com/exploits/51580
- https://www.vulncheck.com/advisories/frappe-framework-erpnext-remote-code-execution



