RSS   Vulnerabilities for 'Strapi'   RSS

2022-05-03
 
CVE-2021-46440

CWE-922
 

 
Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim's HTTP request, get the victim's cookie, perform a base64 decode on the victim's cookie, and obtain a cleartext password, leading to getting API documentation for further API attacks.

 
2022-04-12
 
CVE-2022-27263

CWE-434
 

 
An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file.

 
2021-05-06
 
CVE-2021-28128

CWE-640
 

 
In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password.

 
2020-10-22
 
CVE-2020-27666

CWE-79
 

 
Strapi before 3.2.5 has stored XSS in the wysiwyg editor's preview feature.

 
 
CVE-2020-27665

CWE-276
 

 
In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes.

 
 
CVE-2020-27664

NVD-CWE-noinfo
 

 
admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality.

 
2020-06-19
 
CVE-2020-13961

CWE-20
 

 
Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails.

 
2020-02-04
 
CVE-2020-8123

CWE-400
 

 
A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application.

 
2019-12-05
 
CVE-2019-19609

CWE-20
 

 
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.

 
2019-11-07
 
CVE-2019-18818

CWE-640
 

 
strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js.

 


Copyright 2024, cxsecurity.com

 

Back to Top