CVE-2025-53092
- EPSS 0.05%
- Veröffentlicht 16.10.2025 16:29:35
- Zuletzt bearbeitet 25.11.2025 18:44:29
Strapi is an open source headless content management system. Strapi versions prior to 5.20.0 contain a CORS misconfiguration vulnerability in default installations. By default, Strapi reflects the value of the Origin header back in the Access-Control...
CVE-2025-25298
- EPSS 0.07%
- Veröffentlicht 16.10.2025 16:21:45
- Zuletzt bearbeitet 31.12.2025 01:06:00
Strapi is an open source headless CMS. The @strapi/core package before version 5.10.3 does not enforce a maximum password length when using bcryptjs for password hashing. Bcryptjs ignores any bytes beyond 72, so passwords longer than 72 bytes are sil...
CVE-2024-56143
- EPSS 0.02%
- Veröffentlicht 16.10.2025 16:15:36
- Zuletzt bearbeitet 31.12.2025 01:05:40
Strapi is an open-source headless content management system. In versions from 5.0.0 to before 5.5.2, the lookup operator provided by the document service does not properly sanitize query parameters for private fields. An attacker can access private f...
CVE-2025-3930
- EPSS 0.12%
- Veröffentlicht 16.10.2025 10:43:21
- Zuletzt bearbeitet 22.10.2025 07:15:32
Strapi uses JSON Web Tokens (JWT) for authentication. After logout or account deactivation, the JWT is not invalidated, which allows an attacker who has stolen or intercepted the token to freely reuse it until its expiration date (which is set to 30 ...
CVE-2024-52588
- EPSS 0.1%
- Veröffentlicht 29.05.2025 09:02:15
- Zuletzt bearbeitet 24.06.2025 18:27:42
Strapi is an open-source content management system. Prior to version 4.25.2, inputting a local domain into the Webhooks URL field leads to the application fetching itself, resulting in a server side request forgery (SSRF). This issue has been patched...
CVE-2024-37818
- EPSS 0.16%
- Veröffentlicht 20.06.2024 19:15:50
- Zuletzt bearbeitet 21.11.2024 09:24:20
Strapi v4.24.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /strapi.io/_next/image. This vulnerability allows attackers to scan for open ports or access sensitive information via a crafted GET request. NOTE: The St...
CVE-2024-31217
- EPSS 1.8%
- Veröffentlicht 12.06.2024 15:15:51
- Zuletzt bearbeitet 21.11.2024 09:13:03
Strapi is an open-source content management system. Prior to version 4.22.0, a denial-of-service vulnerability is present in the media upload process causing the server to crash without restarting, affecting either development and production environm...
CVE-2024-34065
- EPSS 0.8%
- Veröffentlicht 12.06.2024 15:15:51
- Zuletzt bearbeitet 21.11.2024 09:18:00
Strapi is an open-source content management system. By combining two vulnerabilities (an `Open Redirect` and `session token sent as URL query parameter`) in @strapi/plugin-users-permissions before version 4.24.2, is its possible of an unauthenticated...
CVE-2024-29181
- EPSS 0.43%
- Veröffentlicht 12.06.2024 15:15:50
- Zuletzt bearbeitet 21.11.2024 09:07:44
Strapi is an open-source content management system. Prior to version 4.19.1, a super admin can create a collection where an item in the collection has an association to another collection. When this happens, another user with Author Role can see the ...
CVE-2023-39345
- EPSS 0.08%
- Veröffentlicht 06.11.2023 19:15:09
- Zuletzt bearbeitet 21.11.2024 08:15:12
strapi is an open-source headless CMS. Versions prior to 4.13.1 did not properly restrict write access to fielded marked as private in the user registration endpoint. As such malicious users may be able to errantly modify their user records. This iss...