Skip to content

Improper Input Validation in strapi

Moderate severity GitHub Reviewed Published May 24, 2022 to the GitHub Advisory Database • Updated Jan 27, 2023

Package

npm strapi (npm)

Affected versions

< 3.0.2

Patched versions

3.0.2

Description

Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails.

References

Published by the National Vulnerability Database Jun 19, 2020
Published to the GitHub Advisory Database May 24, 2022
Reviewed Jun 21, 2022
Last updated Jan 27, 2023

Severity

Moderate
6.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Weaknesses

CVE ID

CVE-2020-13961

GHSA ID

GHSA-65wv-528r-m892

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.