[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-35614":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T21:11:43.830Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":44,"aliases":45,"duplicate_of":9,"upstream":46,"downstream":47,"duplicates":48,"related":49,"reserved_at":9,"published_at":50,"modified_at":50,"state":51,"summary":52,"references_raw":59,"kevs":66,"epss":9,"epss_history":67,"metrics":68,"affected":75},"CVE-2026-35614","Frappe is a full-stack web application framework. Prior to 16.14.0 and 15.104.0, Frappe has a SQL injection in bulk_update. This vulnerability is fixed in 16.14.0 and 15.104.0.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-89","Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.","weakness","Stable","Base","High",[20,24,28,32,36,40],{"id":21,"name":22,"techniques":23},"CAPEC-108","Command Line Execution through SQL Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-109","Object Relational Mapping Injection",[],{"id":29,"name":30,"techniques":31},"CAPEC-110","SQL Injection through SOAP Parameter Tampering",[],{"id":33,"name":34,"techniques":35},"CAPEC-470","Expanding Control over the Operating System from the Database",[],{"id":37,"name":38,"techniques":39},"CAPEC-66","SQL Injection",[],{"id":41,"name":42,"techniques":43},"CAPEC-7","Blind SQL Injection",[],[],[],[],[],[],[],"2026-04-07T16:42:12.740Z","Received",{"cisa_kev":53,"cisa_ransomware":53,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":54,"severity_score":55,"severity_version":56,"severity_source":57,"severity_vector":58,"severity_status":51},false,"critical",9.3,"v4.0","cve.org","CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",[60],{"url":61,"sources":62,"tags":64},"https://github.com/frappe/frappe/security/advisories/GHSA-583g-fg76-fhfr",[57,63],"nvd",[65],"X Refsource CONFIRM",[],[],[69,72],{"source":57,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":9,"cvss_v4_0":70},{"baseScore":55,"baseSeverity":71,"vectorString":58,"impactScore":9,"exploitabilityScore":9},"CRITICAL",{"source":63,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":9,"cvss_v4_0":73},{"baseScore":55,"baseSeverity":71,"vectorString":74,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[76],{"ecosystem":9,"name":77,"vendor":77,"product":77,"cpe_part":78,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":79},"frappe","a",[80,85],{"version":81,"is_range":82,"range_type":57,"version_start":9,"version_start_type":9,"version_end":83,"version_end_type":84,"fixed_in":9},"\u003C 15.104.0",true,"15.104.0","excluding",{"version":86,"is_range":82,"range_type":57,"version_start":87,"version_start_type":88,"version_end":89,"version_end_type":84,"fixed_in":9},">= 16.0.0-beta.1, \u003C 16.14.0","16.0.0-beta.1","including","16.14.0"]