Frappe ERPNext is an open-source enterprise resource planning software used by various organizations. This vulnerability exists in the get_contract_template method of Frappe ERPNext through 15.89.0, allowing an authenticated attacker to inject arbitrary Jinja expressions into contract_terms fields, resulting in server-side code execution within a restricted but still unsafe context.