The vulnerability involves information disclosure leading to account takeover (CWE-200). This typically occurs in authentication/authorization flows. The 'forgot_password' function is a prime candidate because password reset token leakage would directly enable account takeover. The 'get_user_info' function is another likely target, as improper session/user data exposure could provide attackers with credentials or session tokens. Both align with the described attack vector (crafted network requests) and high confidentiality/integrity impacts in the CVSS metrics. While explicit patch details are unavailable, these functions are central to authentication flows and match the vulnerability's technical narrative.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| frappe | pip | ||
| frappe | pip |
A Semantic Attack on Google Gemini - Read the Latest Research