A Server-Side Request Forgery (SSRF) vulnerability exists in the Print Format functionality of ERPNext v16.0.1 and Frappe Framework v16.1.1, where user-supplied HTML is insufficiently sanitized before being rendered into PDF. When generating PDFs from user-controlled HTML content, the application allows the inclusion of HTML elements such as <iframe> that reference external resources. The PDF rendering engine automatically fetches these resources on the server side. An attacker can abuse this behavior to force the server to make arbitrary HTTP requests to internal services, including cloud metadata endpoints, potentially leading to sensitive information disclosure.

Project Subscriptions

Vendors Products
Erpnext Subscribe
Framework Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 15 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Title SSRF Vulnerability in ERPNext PDF Rendering Enables Internal Resource Discovery and Data Exposure

Tue, 14 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Frappe frappe
CPEs cpe:2.3:a:frappe:erpnext:16.0.1:*:*:*:*:*:*:*
cpe:2.3:a:frappe:frappe:16.1.1:*:*:*:*:*:*:*
Vendors & Products Frappe frappe

Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Title SSRF in ERPNext PDF Rendering Allows Server‑Side Requests

Thu, 09 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Frappe
Frappe erpnext
Frappe framework
Vendors & Products Frappe
Frappe erpnext
Frappe framework

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title SSRF in ERPNext PDF Rendering Allows Server‑Side Requests
Weaknesses CWE-918

Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Description A Server-Side Request Forgery (SSRF) vulnerability exists in the Print Format functionality of ERPNext v16.0.1 and Frappe Framework v16.1.1, where user-supplied HTML is insufficiently sanitized before being rendered into PDF. When generating PDFs from user-controlled HTML content, the application allows the inclusion of HTML elements such as <iframe> that reference external resources. The PDF rendering engine automatically fetches these resources on the server side. An attacker can abuse this behavior to force the server to make arbitrary HTTP requests to internal services, including cloud metadata endpoints, potentially leading to sensitive information disclosure.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-09T20:49:57.487Z

Reserved: 2026-03-09T00:00:00.000Z

Link: CVE-2026-31017

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T17:21:18.737

Modified: 2026-04-14T15:46:59.460

Link: CVE-2026-31017

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:15:11Z

Weaknesses