CVE-2025-59421

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-59421
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-59421.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-59421
Aliases
  • GHSA-68qm-vp8f-rpr3
Published
2025-09-18T14:42:40Z
Modified
2025-11-04T19:33:34Z
Severity
  • 2.7 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
Press vulnerable to email flooding to users due to lack of validation and rate limits
Details

Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). A bad actor can flood the inbox of a user by repeatedly sending invites (duplicate). The issue is fixed in commit 83c3fc7676c5dbbe1fd5092d21d95a10c7b48615.

Database specific
{
    "cwe_ids": [
        "CWE-770"
    ]
}
References

Affected packages

Git / github.com/frappe/press

Affected ranges

Type
GIT
Repo
https://github.com/frappe/press
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed