Vulnerabilities
Vulnerable Software
Strapi:  >> Strapi  >> 1.0.1  Security Vulnerabilities
Strapi is an open-source headless content management system. Prior to version 4.10.8, anyone (Strapi developers, users, plugins) can make every attribute of a Content-Type public without knowing it. The vulnerability only affects the handling of content types by Strapi, not the actual content types themselves. Users can use plugins or modify their own content types without realizing that the `privateAttributes` getter is being removed, which can result in any attribute becoming public. This can lead to sensitive information being exposed or the entire system being taken control of by an attacker(having access to password hashes). Anyone can be impacted, depending on how people are using/extending content-types. If the users are mutating the content-type, they will not be affected. Version 4.10.8 contains a patch for this issue.
CVSS Score
4.8
EPSS Score
0.001
Published
2023-07-25
Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses.
CVSS Score
8.8
EPSS Score
0.006
Published
2022-09-27
Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege.
CVSS Score
4.8
EPSS Score
0.005
Published
2022-06-13
Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim's HTTP request, get the victim's cookie, perform a base64 decode on the victim's cookie, and obtain a cleartext password, leading to getting API documentation for further API attacks.
CVSS Score
7.5
EPSS Score
0.031
Published
2022-05-03
Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0.
CVSS Score
6.1
EPSS Score
0.002
Published
2022-02-26
In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password.
CVSS Score
8.1
EPSS Score
0.003
Published
2021-05-06
admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality.
CVSS Score
9.8
EPSS Score
0.013
Published
2020-10-22
In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes.
CVSS Score
7.5
EPSS Score
0.003
Published
2020-10-22
Strapi before 3.2.5 has stored XSS in the wysiwyg editor's preview feature.
CVSS Score
5.4
EPSS Score
0.003
Published
2020-10-22
Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails.
CVSS Score
6.5
EPSS Score
0.006
Published
2020-06-19


Contact Us

Shodan ® - All rights reserved