Show filters
28 Total Results
Displaying 11-20 of 28
Sort by:
Attacker Value
Unknown
CVE-2023-22893
Disclosure Date: April 19, 2023 (last updated October 08, 2023)
Strapi through 4.5.5 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the 'None' type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.
0
Attacker Value
Unknown
CVE-2023-22621
Disclosure Date: April 19, 2023 (last updated October 08, 2023)
Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution.
0
Attacker Value
Unknown
CVE-2022-31367
Disclosure Date: September 27, 2022 (last updated February 24, 2025)
Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses.
0
Attacker Value
Unknown
CVE-2022-32114
Disclosure Date: July 13, 2022 (last updated February 24, 2025)
An unrestricted file upload vulnerability in the Add New Assets function of Strapi 4.1.12 allows attackers to conduct XSS attacks via a crafted PDF file. NOTE: the project documentation suggests that a user with the Media Library "Create (upload)" permission is supposed to be able to upload PDF files containing JavaScript, and that all files in a public assets folder are accessible to the outside world (unless the filename begins with a dot character). The administrator can choose to allow only image, video, and audio files (i.e., not PDF) if desired.
0
Attacker Value
Unknown
CVE-2022-29894
Disclosure Date: June 13, 2022 (last updated February 23, 2025)
Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege.
0
Attacker Value
Unknown
CVE-2022-30618
Disclosure Date: May 19, 2022 (last updated February 23, 2025)
An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for API users if content types accessible to the authenticated user contain relationships to API users (from:users-permissions). There are many scenarios in which such details from API users can leak in the JSON response within the admin panel, either through a direct or indirect relationship. Access to this information enables a user to compromise these users’ accounts if the password reset API endpoints have been enabled. In a worst-case scenario, a low-privileged user could get access to a high-privileged API account, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users.
0
Attacker Value
Unknown
CVE-2022-30617
Disclosure Date: May 19, 2022 (last updated February 23, 2025)
An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for other admin panel users that have a relationship (e.g., created by, updated by) with content accessible to the authenticated user. For example, a low-privileged “author” role account can view these details in the JSON response for an “editor” or “super admin” that has updated one of the author’s blog posts. There are also many other scenarios where such details from other users can leak in the JSON response, either through a direct or indirect relationship. Access to this information enables a user to compromise other users’ accounts by successfully invoking the password reset workflow. In a worst-case scenario, a low-privileged user could get access to a “super admin” account with full control over the Strapi instance, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other…
0
Attacker Value
Unknown
CVE-2021-46440
Disclosure Date: May 03, 2022 (last updated February 23, 2025)
Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim's HTTP request, get the victim's cookie, perform a base64 decode on the victim's cookie, and obtain a cleartext password, leading to getting API documentation for further API attacks.
0
Attacker Value
Unknown
CVE-2022-27263
Disclosure Date: April 12, 2022 (last updated February 23, 2025)
An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file.
0
Attacker Value
Unknown
CVE-2022-0764
Disclosure Date: February 26, 2022 (last updated February 23, 2025)
Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0.
0