@strapi/strapi@4.6.0-beta.0 vulnerabilities

An open source headless CMS solution to create and manage your own API. It provides a powerful dashboard and features to make your life easier. Databases supported: MySQL, MariaDB, PostgreSQL, SQLite

Direct Vulnerabilities

Known vulnerabilities in the @strapi/strapi package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Improper Access Control

@strapi/strapi is an updated version of the old 'strapi', which is a free and open-source headless CMS delivering your content anywhere you need.

Affected versions of this package are vulnerable to Improper Access Control via the "User Registration" API due to improper sanitization of custom fields. An attacker can gain unauthorized access to private fields during user registration by sending a post request with content to fill the private fields.

How to fix Improper Access Control?

Upgrade @strapi/strapi to version 4.13.1 or higher.

>=4.0.0 <4.13.1
  • M
Information Exposure

@strapi/strapi is an updated version of the old 'strapi', which is a free and open-source headless CMS delivering your content anywhere you need.

Affected versions of this package are vulnerable to Information Exposure by developers, users, or plugins, all of who can make every attribute of a Content-Type public without knowing it. The privateAttributes getter is removed when content types are modified, which can result in any attribute becoming public.

NOTE: If a user mutates the content-type they will not be affected.

How to fix Information Exposure?

Upgrade @strapi/strapi to version 4.10.8 or higher.

<4.10.8
  • H
Information Exposure

@strapi/strapi is an updated version of the old 'strapi', which is a free and open-source headless CMS delivering your content anywhere you need.

Affected versions of this package are vulnerable to Information Exposure by revealing sensitive user information (including on Super Administrators) by filtering on private fields (including password reset tokens). This can allow an attacker to hijack a privileged account.

How to fix Information Exposure?

Upgrade @strapi/strapi to version 4.8.0 or higher.

>=4.0.0-next.0 <4.8.0