{"api_version":"1","generated_at":"2026-04-23T05:26:18+00:00","cve":"CVE-2026-40888","urls":{"html":"https://cve.report/CVE-2026-40888","api":"https://cve.report/api/cve/CVE-2026-40888.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-40888","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-40888"},"summary":{"title":"Frappe HR vulnerable to Improper Access Control","description":"Frappe HR is an open-source human resources management solution (HRMS). Prior to versions 15.58.1 and 16.4.1, an authenticated user with default role can access unauthorized information by exploiting certain api endpoint. Versions 15.58.1 and 16.4.1 contain a patch. No known workarounds are available.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-04-21 20:17:02","updated_at":"2026-04-22 21:24:26"},"problem_types":["CWE-284","CWE-284 CWE-284: Improper Access Control"],"metrics":[{"version":"3.0","source":"security-advisories@github.com","type":"Secondary","score":"6.5","severity":"MEDIUM","vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","data":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"3.0","source":"CNA","type":"DECLARED","score":"6.5","severity":"MEDIUM","vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.0"}}],"references":[{"url":"https://github.com/frappe/hrms/releases/tag/v15.58.1","name":"https://github.com/frappe/hrms/releases/tag/v15.58.1","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/frappe/hrms/releases/tag/v16.4.1","name":"https://github.com/frappe/hrms/releases/tag/v16.4.1","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/frappe/hrms/security/advisories/GHSA-4375-7rxj-9hfx","name":"https://github.com/frappe/hrms/security/advisories/GHSA-4375-7rxj-9hfx","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-40888","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40888","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"frappe","product":"hrms","version":"affected < 15.58.1","platforms":[]},{"source":"CNA","vendor":"frappe","product":"hrms","version":"affected < 16.4.1","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"40888","cve":"CVE-2026-40888","epss":"0.000290000","percentile":"0.082970000","score_date":"2026-04-22","updated_at":"2026-04-23 00:03:14"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-40888","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-21T19:43:31.343136Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-21T19:43:37.506Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"hrms","vendor":"frappe","versions":[{"status":"affected","version":"< 15.58.1"},{"status":"affected","version":"< 16.4.1"}]}],"descriptions":[{"lang":"en","value":"Frappe HR is an open-source human resources management solution (HRMS). Prior to versions 15.58.1 and 16.4.1, an authenticated user with default role can access unauthorized information by exploiting certain api endpoint. Versions 15.58.1 and 16.4.1 contain a patch. No known workarounds are available."}],"metrics":[{"cvssV3_0":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-284","description":"CWE-284: Improper Access Control","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-21T19:28:28.849Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/frappe/hrms/security/advisories/GHSA-4375-7rxj-9hfx","tags":["x_refsource_CONFIRM"],"url":"https://github.com/frappe/hrms/security/advisories/GHSA-4375-7rxj-9hfx"},{"name":"https://github.com/frappe/hrms/releases/tag/v15.58.1","tags":["x_refsource_MISC"],"url":"https://github.com/frappe/hrms/releases/tag/v15.58.1"},{"name":"https://github.com/frappe/hrms/releases/tag/v16.4.1","tags":["x_refsource_MISC"],"url":"https://github.com/frappe/hrms/releases/tag/v16.4.1"}],"source":{"advisory":"GHSA-4375-7rxj-9hfx","discovery":"UNKNOWN"},"title":"Frappe HR vulnerable to Improper Access Control"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-40888","datePublished":"2026-04-21T19:28:28.849Z","dateReserved":"2026-04-15T16:37:22.765Z","dateUpdated":"2026-04-21T19:43:37.506Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-21 20:17:02","lastModifiedDate":"2026-04-22 21:24:26","problem_types":["CWE-284","CWE-284 CWE-284: Improper Access Control"],"metrics":{"cvssMetricV30":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"40888","Ordinal":"1","Title":"Frappe HR vulnerable to Improper Access Control","CVE":"CVE-2026-40888","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"40888","Ordinal":"1","NoteData":"Frappe HR is an open-source human resources management solution (HRMS). Prior to versions 15.58.1 and 16.4.1, an authenticated user with default role can access unauthorized information by exploiting certain api endpoint. Versions 15.58.1 and 16.4.1 contain a patch. No known workarounds are available.","Type":"Description","Title":"Frappe HR vulnerable to Improper Access Control"}]}}}