Filtered by vendor Strapi
Subscribe
Total
29 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-30617 | 1 Strapi | 1 Strapi | 2024-02-28 | 9.0 HIGH | 8.8 HIGH |
An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for other admin panel users that have a relationship (e.g., created by, updated by) with content accessible to the authenticated user. For example, a low-privileged “author” role account can view these details in the JSON response for an “editor” or “super admin” that has updated one of the author’s blog posts. There are also many other scenarios where such details from other users can leak in the JSON response, either through a direct or indirect relationship. Access to this information enables a user to compromise other users’ accounts by successfully invoking the password reset workflow. In a worst-case scenario, a low-privileged user could get access to a “super admin” account with full control over the Strapi instance, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users. | |||||
CVE-2021-28128 | 1 Strapi | 1 Strapi | 2024-02-28 | 5.5 MEDIUM | 8.1 HIGH |
In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password. | |||||
CVE-2020-27665 | 1 Strapi | 1 Strapi | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes. | |||||
CVE-2020-27666 | 1 Strapi | 1 Strapi | 2024-02-28 | 3.5 LOW | 5.4 MEDIUM |
Strapi before 3.2.5 has stored XSS in the wysiwyg editor's preview feature. | |||||
CVE-2020-27664 | 1 Strapi | 1 Strapi | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality. | |||||
CVE-2020-13961 | 1 Strapi | 1 Strapi | 2024-02-28 | 4.0 MEDIUM | 6.5 MEDIUM |
Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails. | |||||
CVE-2020-8123 | 1 Strapi | 1 Strapi | 2024-02-28 | 4.0 MEDIUM | 4.9 MEDIUM |
A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application. | |||||
CVE-2019-18818 | 1 Strapi | 1 Strapi | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js. | |||||
CVE-2019-19609 | 1 Strapi | 1 Strapi | 2024-02-28 | 9.0 HIGH | 7.2 HIGH |
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function. |