@strapi/admin@0.0.0-experimental.16a6ec52546a0c189b42121e51a744fd04fc0d65 vulnerabilities

Strapi Admin

  • latest version

    5.16.0

  • latest non vulnerable version

  • first published

    3 years ago

  • latest version published

    3 days ago

  • Direct Vulnerabilities

    Known vulnerabilities in the @strapi/admin package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Server-side Request Forgery (SSRF)

    @strapi/admin is a Strapi Admin

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the Settings -> Webhooks function. An attacker can manipulate the application to expose information on internal resources, such as to detect open ports, by supplying malicious URLs pointing to local or internal addresses.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade @strapi/admin to version 4.25.2 or higher.

    <4.25.2
    • H
    Denial of Service (DoS)

    @strapi/admin is a Strapi Admin

    Affected versions of this package are vulnerable to Denial of Service (DoS) such that an attacker can circumvent the rate limit on the login function of Strapi's admin screen.

    How to fix Denial of Service (DoS)?

    Upgrade @strapi/admin to version 4.12.1 or higher.

    <4.12.1
    • M
    Information Exposure

    @strapi/admin is a Strapi Admin

    Affected versions of this package are vulnerable to Information Exposure such that attackers can get access to user reset password tokens given that they have the configure view permissions. This issue arises because the /content-manager/relations route does not remove private fields or ensure that they can't be selected.

    How to fix Information Exposure?

    Upgrade @strapi/admin to version 4.11.7 or higher.

    <4.11.7