Page 2 of 20 results (0.010 seconds)

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 1

Strapi is an open-source headless content management system. Prior to version 4.11.7, an unauthorized actor can get access to user reset password tokens if they have the configure view permissions. The `/content-manager/relations` route does not remove private fields or ensure that they can't be selected. This issue is fixed in version 4.11.7. Strapi es un sistema de gestión de contenidos headless de código abierto. • https://github.com/strapi/strapi/releases/tag/v4.11.7 https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 1

Strapi is an open-source headless content management system. Prior to version 4.10.8, it is possible to leak private fields if one is using the `t(number)` prefix. Knex query allows users to change the default prefix. For example, if someone changes the prefix to be the same as it was before or to another table they want to query, the query changes from `password` to `t1.password`. `password` is protected by filtering protections but `t1.password` is not protected. • https://github.com/strapi/strapi/releases/tag/v4.10.8 https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 1

Strapi is an open-source headless content management system. Prior to version 4.10.8, anyone (Strapi developers, users, plugins) can make every attribute of a Content-Type public without knowing it. The vulnerability only affects the handling of content types by Strapi, not the actual content types themselves. Users can use plugins or modify their own content types without realizing that the `privateAttributes` getter is being removed, which can result in any attribute becoming public. This can lead to sensitive information being exposed or the entire system being taken control of by an attacker(having access to password hashes). • https://github.com/strapi/strapi/commit/2fa8f30371bfd1db44c15e5747860ee5789096de https://github.com/strapi/strapi/releases/tag/v4.10.8 https://github.com/strapi/strapi/security/advisories/GHSA-chmr-rg2f-9jmf • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses. Strapi versiones anteriores a 3.6.10 y 4.x anteriores a 4.1.10, maneja inapropiadamente los atributos ocultos dentro de las respuestas de la API de administración • https://github.com/kos0ng/CVEs/tree/main/CVE-2022-31367 https://github.com/strapi/strapi/releases/tag/v3.6.10 https://github.com/strapi/strapi/releases/tag/v4.1.10 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 0

Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege. Strapi versiones v3.x.x y anteriores, contienen una vulnerabilidad de tipo cross-site scripting almacenada en la función file upload. Al explotar esta vulnerabilidad, puede ejecutarse un script arbitrario en el navegador web del usuario que está iniciando sesión en el producto con el privilegio administrativo • https://github.com/strapi/strapi https://jvn.jp/en/jp/JVN44550983/index.html https://strapi.io • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •