CVE-2026-44440
ERPNext: Path Traversal Leading to Sensitive File Exposure
CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th
ERPNext is a free and open source Enterprise Resource Planning tool. Prior to 15.101.1 and 16.10.0, an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability on an endpoint allows an authenticated adjacent attacker to read arbitrary files. This vulnerability is fixed in 15.101.1 and 16.10.0.
| CWE | CWE-22 |
| Vendor | frappe |
| Product | erpnext |
| Published | May 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for frappe erpnext
Be the first to know when new medium vulnerabilities affecting frappe erpnext are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Affected Versions
frappe / erpnext
< 15.101.1 >= 16.0.0-beta.1, < 16.10.0