Frappe ERPNext is an open-source enterprise resource planning software used by various organizations. The vulnerability exists in the get_dunning_letter_text method of Frappe ERPNext through 15.89.0, which renders attacker-controlled Jinja2 templates using frappe.render_template() with a user-supplied context (doc). This allows an authenticated attacker to inject arbitrary Jinja expressions, resulting in server-side code execution within a restricted but still unsafe context.