Show filters
29 Total Results
Displaying 21-29 of 29
Sort by:
Attacker Value
Unknown

CVE-2022-0764

Disclosure Date: February 26, 2022 (last updated February 23, 2025)
Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0.
Attacker Value
Unknown

CVE-2021-28128

Disclosure Date: May 06, 2021 (last updated February 22, 2025)
In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password.
Attacker Value
Unknown

CVE-2020-27665

Disclosure Date: October 22, 2020 (last updated February 22, 2025)
In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes.
Attacker Value
Unknown

CVE-2020-27666

Disclosure Date: October 22, 2020 (last updated February 22, 2025)
Strapi before 3.2.5 has stored XSS in the wysiwyg editor's preview feature.
Attacker Value
Unknown

CVE-2020-27664

Disclosure Date: October 22, 2020 (last updated November 28, 2024)
admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality.
Attacker Value
Unknown

CVE-2020-13961

Disclosure Date: June 19, 2020 (last updated February 21, 2025)
Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails.
Attacker Value
Unknown

CVE-2020-8123

Disclosure Date: February 04, 2020 (last updated February 21, 2025)
A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application.
Attacker Value
Unknown

CVE-2019-19609

Disclosure Date: December 05, 2019 (last updated November 27, 2024)
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
Attacker Value
Unknown

CVE-2019-18818

Disclosure Date: November 07, 2019 (last updated November 27, 2024)
strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js.