Strapi allows unauthenticated attacker to reset admin password without valid reset token
Critical severity
GitHub Reviewed
Published
Dec 2, 2019
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Nov 7, 2019
Reviewed
Dec 2, 2019
Published to the GitHub Advisory Database
Dec 2, 2019
Last updated
Jan 27, 2023
Versions of
strapi
prior to 3.0.0-beta.17.5 are vulnerable to Privilege Escalation. The password reset routes allows an unauthenticated attacker to reset an admin's password without providing a valid password reset token.Recommendation
Upgrade to version 3.0.0-beta.17.5 or later.
References