Version 3.6.11

strapi

πŸš€ Strapi is the leading open-source headless CMS. It’s 100% JavaScript/TypeScript, fully customizable, and developer-first.

Install Instructions

npm install strapi
Current Version Release Date November 22, 2022
Package URL (purl) pkg:npm/strapi@3.6.11

Find strapi vulnerabilities in your supply chain.

Scan for Free

strapi Vulnerabilities

Sort by
icon CVE (Latest)
  • icon CVE (Latest)
  • icon CVE (Oldest)
  • icon CVSS Score (Highest)
  • icon CVSS Score (Lowest)
CVE question mark icon CVSS Score question mark icon CWE(s) question mark icon EPSS Score question mark icon EPSS % question mark icon Impacted Versions
CVE-2019-18818 High 9.8 CWE-640 0.96688 0.99702
  • 3.0.0-alpha.4.3–3.0.0-beta.17.4
  • 2.0.1–2.0.2
  • 1.0.0–1.6.4
CVE-2019-19609 High 7.2 CWE-78 0.09171 0.94893
  • 3.0.0-alpha.4.3–3.0.0-beta.17.7
  • 2.0.1–2.0.2
  • 1.0.0–1.6.4
CVE-2020-13961 Medium 6.5 CWE-20 0.0011 0.45614
  • 3.0.0–3.0.2-next.48
  • 2.0.1–2.0.2
  • 1.0.0–1.6.4
CVE-2020-27664 High 9.8 CWE-918 0.00235 0.62383
  • 3.0.0–3.2.4
  • 2.0.1–2.0.2
  • 1.0.0–1.6.4
CVE-2020-8123 Medium 4.9 CWE-400 0.00079 0.35587
  • 3.0.0-alpha.4.3–3.0.0-beta.18.3
  • 2.0.1–2.0.2
  • 1.0.0–1.6.4
CVE-2021-28128 High 8.1 CWE-640 0.00155 0.53002
  • 3.0.0–3.6.11
  • 2.0.1–2.0.2
  • 1.0.0–1.6.4
CVE-2021-46440 High 7.5 CWE-922 0.00759 0.81737
  • 3.0.0–3.6.8
  • 2.0.1–2.0.2
  • 1.0.0–1.6.4
CVE-2022-0764 Medium 6.7 CWE-77, CWE-78 0.00126 0.48716
  • 3.0.0–3.6.11
  • 2.0.1–2.0.2
  • 1.0.0–1.6.4
CVE-2022-27263 High 9.8 CWE-434 0.00428 0.75162
  • 3.0.0–3.6.11
  • 2.0.1–2.0.2
  • 1.0.0–1.6.4
CVE-2022-29894 Medium 4.8 CWE-79 0.00063 0.28562
  • 3.0.0–3.6.11
  • 2.0.1–2.0.2
  • 1.0.0–1.6.4
CVE-2022-31367 High 8.8 CWE-89 0.00196 0.58323
  • 3.0.0–3.6.9
  • 2.0.1–2.0.2
  • 1.0.0–1.6.4
CVE-2022-30617 High 8.8 CWE-212 0.00104 0.44025
  • 3.0.0–3.6.8
CVE-2022-30618 High 7.5 CWE-212 0.00104 0.44025
  • 3.0.0–3.6.8

strapi Vulnerability Remediation Guidance

CVE Description Full list of Impacted Versions Fix
CVE-2022-31367 Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses. 3.0.0-alpha.14.1.1, 3.0.0-alpha.4.8, 3.0.0-alpha.5.2, 3.4.1, 3.4.4, 3.0.0-alpha.5.3, 3.0.0-alpha.6.2, 3.0.0-alpha.6.5 (Show all) Patch β†’ NO_SAFE_VERSION
CVE-2022-30618 An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for API users if content types accessible to the authenticated user contain relationships to API users (from:users-permissions). There are many scenarios in which such details from API users can leak in the JSON response within the admin panel, either through a direct or indirect relationship. Access to this information enables a user to compromise these users’ accounts if the password reset API endpoints have been enabled. In a worst-case scenario, a low-privileged user could get access to a high-privileged API account, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users. 3.4.1, 3.4.4, 3.0.2-next.48, 3.1.0-alpha.2, 3.0.5, 3.1.0-alpha.1, 3.1.3, 3.1.6 (Show all) Patch β†’ NO_SAFE_VERSION
CVE-2022-30617 An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for other admin panel users that have a relationship (e.g., created by, updated by) with content accessible to the authenticated user. For example, a low-privileged β€œauthor” role account can view these details in the JSON response for an β€œeditor” or β€œsuper admin” that has updated one of the author’s blog posts. There are also many other scenarios where such details from other users can leak in the JSON response, either through a direct or indirect relationship. Access to this information enables a user to compromise other users’ accounts by successfully invoking the password reset workflow. In a worst-case scenario, a low-privileged user could get access to a β€œsuper admin” account with full control over the Strapi instance, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users. 3.4.1, 3.4.4, 3.0.2-next.48, 3.1.0-alpha.2, 3.0.5, 3.1.0-alpha.1, 3.1.3, 3.1.6 (Show all) Patch β†’ NO_SAFE_VERSION
CVE-2022-29894 Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege. 3.0.0-alpha.14.1.1, 3.0.0-alpha.4.8, 3.0.0-alpha.5.2, 3.6.10, 3.4.1, 3.4.4, 3.0.0-alpha.5.3, 3.0.0-alpha.6.2 (Show all) Patch β†’ NO_SAFE_VERSION
CVE-2022-27263 An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file. 3.0.0-alpha.14.1.1, 3.0.0-alpha.4.8, 3.0.0-alpha.5.2, 3.6.10, 3.4.1, 3.4.4, 3.0.0-alpha.5.3, 3.0.0-alpha.6.2 (Show all) Patch β†’ NO_SAFE_VERSION
CVE-2022-0764 Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0. 3.0.0-alpha.14.1.1, 3.0.0-alpha.4.8, 3.0.0-alpha.5.2, 3.6.10, 3.4.1, 3.4.4, 3.0.0-alpha.5.3, 3.0.0-alpha.6.2 (Show all) Patch β†’ NO_SAFE_VERSION
CVE-2021-46440 Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim's HTTP request, get the victim's cookie, perform a base64 decode on the victim's cookie, and obtain a cleartext password, leading to getting API documentation for further API attacks. 3.0.0-alpha.14.1.1, 3.0.0-alpha.4.8, 3.0.0-alpha.5.2, 3.4.1, 3.4.4, 3.0.0-alpha.5.3, 3.0.0-alpha.6.2, 3.0.0-alpha.6.5 (Show all) Patch β†’ NO_SAFE_VERSION
CVE-2021-28128 In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password. 3.0.0-alpha.14.1.1, 3.0.0-alpha.4.8, 3.0.0-alpha.5.2, 3.6.10, 3.4.1, 3.4.4, 3.0.0-alpha.5.3, 3.0.0-alpha.6.2 (Show all) Patch β†’ NO_SAFE_VERSION
CVE-2020-8123 A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application. 3.0.0-alpha.14.1.1, 3.0.0-alpha.4.8, 3.0.0-alpha.5.2, 3.0.0-alpha.5.3, 3.0.0-alpha.6.2, 3.0.0-alpha.6.5, 3.0.0-alpha.8.1, 3.0.0-alpha.9.1 (Show all) Patch β†’ NO_SAFE_VERSION
CVE-2020-27664 admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality. 3.0.0-alpha.14.1.1, 3.0.0-alpha.4.8, 3.0.0-alpha.5.2, 3.0.0-alpha.5.3, 3.0.0-alpha.6.2, 3.0.0-alpha.6.5, 3.0.0-alpha.8.1, 3.0.0-alpha.9.1 (Show all) Patch β†’ NO_SAFE_VERSION
CVE-2020-13961 Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails. 3.0.0-alpha.14.1.1, 3.0.0-alpha.4.8, 3.0.0-alpha.5.2, 3.0.0-alpha.5.3, 3.0.0-alpha.6.2, 3.0.0-alpha.6.5, 3.0.0-alpha.8.1, 3.0.0-alpha.9.1 (Show all) Patch β†’ NO_SAFE_VERSION
CVE-2019-19609 The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function. 3.0.0-alpha.14.1.1, 3.0.0-alpha.4.8, 3.0.0-alpha.5.2, 3.0.0-alpha.5.3, 3.0.0-alpha.6.2, 3.0.0-alpha.6.5, 3.0.0-alpha.8.1, 3.0.0-alpha.9.1 (Show all) Patch β†’ NO_SAFE_VERSION
CVE-2019-18818 strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js. 3.0.0-alpha.14.1.1, 3.0.0-alpha.4.8, 3.0.0-alpha.5.2, 3.0.0-alpha.5.3, 3.0.0-alpha.6.2, 3.0.0-alpha.6.5, 3.0.0-alpha.8.1, 3.0.0-alpha.9.1 (Show all) Patch β†’ NO_SAFE_VERSION

Instantly see if these strapi vulnerabilities affect your code.

Scan for Free