Attack Complexity Low
Privileges Required High
Exploit Maturity Proof of concept
EPSS 0.06% (24th percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.Test your applications
- Snyk ID SNYK-JS-STRAPI-3034915
- published 28 Sep 2022
- disclosed 28 Sep 2022
- credit Achmad Zaenuri Dahlan Putra
Introduced: 28 Sep 2022CVE-2022-31367 Open this link in a new tab
CWE-20 Open this link in a new tab
How to fix?
strapi to version 3.6.10 or higher.
strapi is a HTTP layer sits on top of Koa.
Affected versions of this package are vulnerable to Improper Input Validation due to mishandling hidden attributes within admin API responses. Exploiting this vulnerability allows users with permission to read user data in the settings section to read all users' data, including password hashes, by manipulating columns when using the filter function.