CVE-2022-29894
- EPSS 0.48%
- Veröffentlicht 13.06.2022 05:15:11
- Zuletzt bearbeitet 21.11.2024 06:59:55
Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with...
CVE-2022-30618
- EPSS 0.3%
- Veröffentlicht 19.05.2022 18:15:09
- Zuletzt bearbeitet 21.11.2024 07:03:02
An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for API users if content types accessible to the authenticated user contain relationships to API users (from:use...
- EPSS 0.36%
- Veröffentlicht 19.05.2022 18:15:09
- Zuletzt bearbeitet 21.11.2024 07:03:02
An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for other admin panel users that have a relationship (e.g., created by, updated by) with content accessible to t...
CVE-2021-46440
- EPSS 3.09%
- Veröffentlicht 03.05.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 06:34:04
Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim's HTTP request, get the victim's cookie, perform a base64 decode on the victim's cookie,...
CVE-2022-27263
- EPSS 1.71%
- Veröffentlicht 12.04.2022 17:15:10
- Zuletzt bearbeitet 21.11.2024 06:55:31
An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file.
CVE-2022-0764
- EPSS 0.22%
- Veröffentlicht 26.02.2022 15:15:07
- Zuletzt bearbeitet 21.11.2024 06:39:20
Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0.
CVE-2021-28128
- EPSS 0.26%
- Veröffentlicht 06.05.2021 14:15:08
- Zuletzt bearbeitet 21.11.2024 05:59:08
In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password.
CVE-2020-27666
- EPSS 0.28%
- Veröffentlicht 22.10.2020 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:21:37
Strapi before 3.2.5 has stored XSS in the wysiwyg editor's preview feature.
CVE-2020-27665
- EPSS 0.29%
- Veröffentlicht 22.10.2020 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:21:37
In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes.
CVE-2020-27664
- EPSS 1.34%
- Veröffentlicht 22.10.2020 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:21:37
admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality.