Authorization Bypass Through User-Controlled Key Affecting @strapi/core package, versions >=5.0.0 <5.5.2


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Authorization Bypass Through User-Controlled Key vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-STRAPICORE-13601313
  • published17 Oct 2025
  • disclosed16 Oct 2025
  • creditBoegie19

Introduced: 16 Oct 2025

NewCVE-2024-56143  (opens in a new tab)
CWE-639  (opens in a new tab)

How to fix?

Upgrade @strapi/core to version 5.5.2 or higher.

Overview

@strapi/core is a Core of Strapi

Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via the lookup operator in the document service due to improper sanitization of query operator for private fields . An attacker can retrieve sensitive private fields, such as administrator passwords and reset tokens, by submitting specially crafted queries.

PoC

  1. Create a strapi app;
  2. Create a content-type;
  3. In the content-type make a new entry;
  4. Go back to the list view;
  5. Add &lookup[updatedBy][password][$startsWith]=$2 to the end of a url (All passwords start with $2) and see that all entries are still there;
  6. Add &lookup[updatedBy][password][$startsWith]=$3 see the entry disappear proving that the search above works.

References

CVSS Base Scores

version 4.0
version 3.1