Strapi is an open-source headless content management system. Prior to version 4.11.7, an unauthorized actor can get access to user reset password tokens if they have the configure view permissions. The `/content-manager/relations` route does not remove private fields or ensure that they can't be selected. This issue is fixed in version 4.11.7.
References
Link | Resource |
---|---|
https://github.com/strapi/strapi/releases/tag/v4.11.7 | Release Notes |
https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-09-15 19:15
Updated : 2023-09-21 13:57
NVD link : CVE-2023-36472
Mitre link : CVE-2023-36472
CVE.ORG link : CVE-2023-36472
JSON object : View
Products Affected
strapi
- strapi
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor