strapi CVE Vulnerabilities & Metrics

Focus on strapi vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About strapi Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with strapi. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total strapi CVEs: 29
Earliest CVE date: 07 Nov 2019, 22:15 UTC
Latest CVE date: 12 Jun 2024, 15:15 UTC

Latest CVE reference: CVE-2024-34065

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 3

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -70.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -70.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical strapi CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.13

Max CVSS: 9.0

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 16
4.0-6.9 7
7.0-8.9 4
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS strapi CVEs

These are the five CVEs with the highest CVSS scores for strapi, sorted by severity first and recency.

All CVEs for strapi

CVE-2024-34065 strapi vulnerability CVSS: 0 12 Jun 2024, 15:15 UTC

Strapi is an open-source content management system. By combining two vulnerabilities (an `Open Redirect` and `session token sent as URL query parameter`) in @strapi/plugin-users-permissions before version 4.24.2, is its possible of an unauthenticated attacker to bypass authentication mechanisms and retrieve the 3rd party tokens. The attack requires user interaction (one click). Unauthenticated attackers can leverage two vulnerabilities to obtain an 3rd party token and the bypass authentication of Strapi apps. Users should upgrade @strapi/plugin-users-permissions to version 4.24.2 to receive a patch.

CVE-2024-31217 strapi vulnerability CVSS: 0 12 Jun 2024, 15:15 UTC

Strapi is an open-source content management system. Prior to version 4.22.0, a denial-of-service vulnerability is present in the media upload process causing the server to crash without restarting, affecting either development and production environments. Usually, errors in the application cause it to log the error and keep it running for other clients. This behavior, in contrast, stops the server execution, making it unavailable for any clients until it's manually restarted. Any user with access to the file upload functionality is able to exploit this vulnerability, affecting applications running in both development mode and production mode as well. Users should upgrade @strapi/plugin-upload to version 4.22.0 to receive a patch.

CVE-2024-29181 strapi vulnerability CVSS: 0 12 Jun 2024, 15:15 UTC

Strapi is an open-source content management system. Prior to version 4.19.1, a super admin can create a collection where an item in the collection has an association to another collection. When this happens, another user with Author Role can see the list of associated items they did not create. They should see nothing but their own items they created not all items ever created. Users should upgrade @strapi/plugin-content-manager to version 4.19.1 to receive a patch.

CVE-2023-48218 strapi vulnerability CVSS: 0 20 Nov 2023, 17:15 UTC

The Strapi Protected Populate Plugin protects `get` endpoints from revealing too much information. Prior to version 1.3.4, users were able to bypass the field level security. Users who tried to populate something that they didn't have access to could populate those fields anyway. This issue has been patched in version 1.3.4. There are no known workarounds.

CVE-2023-39345 strapi vulnerability CVSS: 0 06 Nov 2023, 19:15 UTC

strapi is an open-source headless CMS. Versions prior to 4.13.1 did not properly restrict write access to fielded marked as private in the user registration endpoint. As such malicious users may be able to errantly modify their user records. This issue has been addressed in version 4.13.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-38507 strapi vulnerability CVSS: 0 15 Sep 2023, 20:15 UTC

Strapi is the an open-source headless content management system. Prior to version 4.12.1, there is a rate limit on the login function of Strapi's admin screen, but it is possible to circumvent it. Therefore, the possibility of unauthorized login by login brute force attack increases. Version 4.12.1 has a fix for this issue.

CVE-2023-37263 strapi vulnerability CVSS: 0 15 Sep 2023, 19:15 UTC

Strapi is the an open-source headless content management system. Prior to version 4.12.1, field level permissions are not respected in the relationship title. If an actor has relationship title and the relationship shows a field they don't have permission to see, the field will still be visible. Version 4.12.1 has a fix for this issue.

CVE-2023-36472 strapi vulnerability CVSS: 0 15 Sep 2023, 19:15 UTC

Strapi is an open-source headless content management system. Prior to version 4.11.7, an unauthorized actor can get access to user reset password tokens if they have the configure view permissions. The `/content-manager/relations` route does not remove private fields or ensure that they can't be selected. This issue is fixed in version 4.11.7.

CVE-2023-34235 strapi vulnerability CVSS: 0 25 Jul 2023, 18:15 UTC

Strapi is an open-source headless content management system. Prior to version 4.10.8, it is possible to leak private fields if one is using the `t(number)` prefix. Knex query allows users to change the default prefix. For example, if someone changes the prefix to be the same as it was before or to another table they want to query, the query changes from `password` to `t1.password`. `password` is protected by filtering protections but `t1.password` is not protected. This can lead to filtering attacks on everything related to the object again, including admin passwords and reset-tokens. Version 4.10.8 fixes this issue.

CVE-2023-34093 strapi vulnerability CVSS: 0 25 Jul 2023, 15:15 UTC

Strapi is an open-source headless content management system. Prior to version 4.10.8, anyone (Strapi developers, users, plugins) can make every attribute of a Content-Type public without knowing it. The vulnerability only affects the handling of content types by Strapi, not the actual content types themselves. Users can use plugins or modify their own content types without realizing that the `privateAttributes` getter is being removed, which can result in any attribute becoming public. This can lead to sensitive information being exposed or the entire system being taken control of by an attacker(having access to password hashes). Anyone can be impacted, depending on how people are using/extending content-types. If the users are mutating the content-type, they will not be affected. Version 4.10.8 contains a patch for this issue.

CVE-2023-22894 strapi vulnerability CVSS: 0 19 Apr 2023, 16:15 UTC

Strapi through 4.5.5 allows attackers (with access to the admin panel) to discover sensitive user details by exploiting the query filter. The attacker can filter users by columns that contain sensitive information and infer a value from API responses. If the attacker has super admin access, then this can be exploited to discover the password hash and password reset token of all users. If the attacker has admin panel access to an account with permission to access the username and email of API users with a lower privileged role (e.g., Editor or Author), then this can be exploited to discover sensitive information for all API users but not other admin accounts.

CVE-2023-22893 strapi vulnerability CVSS: 0 19 Apr 2023, 16:15 UTC

Strapi through 4.5.5 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the 'None' type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.

CVE-2023-22621 strapi vulnerability CVSS: 0 19 Apr 2023, 16:15 UTC

Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution.

CVE-2022-31367 strapi vulnerability CVSS: 0 27 Sep 2022, 23:15 UTC

Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses.

CVE-2022-32114 strapi vulnerability CVSS: 6.5 13 Jul 2022, 21:15 UTC

An unrestricted file upload vulnerability in the Add New Assets function of Strapi 4.1.12 allows attackers to conduct XSS attacks via a crafted PDF file. NOTE: the project documentation suggests that a user with the Media Library "Create (upload)" permission is supposed to be able to upload PDF files containing JavaScript, and that all files in a public assets folder are accessible to the outside world (unless the filename begins with a dot character). The administrator can choose to allow only image, video, and audio files (i.e., not PDF) if desired.

CVE-2022-29894 strapi vulnerability CVSS: 3.5 13 Jun 2022, 05:15 UTC

Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege.

CVE-2022-30618 strapi vulnerability CVSS: 6.0 19 May 2022, 18:15 UTC

An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for API users if content types accessible to the authenticated user contain relationships to API users (from:users-permissions). There are many scenarios in which such details from API users can leak in the JSON response within the admin panel, either through a direct or indirect relationship. Access to this information enables a user to compromise these users’ accounts if the password reset API endpoints have been enabled. In a worst-case scenario, a low-privileged user could get access to a high-privileged API account, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users.

CVE-2022-30617 strapi vulnerability CVSS: 9.0 19 May 2022, 18:15 UTC

An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for other admin panel users that have a relationship (e.g., created by, updated by) with content accessible to the authenticated user. For example, a low-privileged “author” role account can view these details in the JSON response for an “editor” or “super admin” that has updated one of the author’s blog posts. There are also many other scenarios where such details from other users can leak in the JSON response, either through a direct or indirect relationship. Access to this information enables a user to compromise other users’ accounts by successfully invoking the password reset workflow. In a worst-case scenario, a low-privileged user could get access to a “super admin” account with full control over the Strapi instance, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users.

CVE-2021-46440 strapi vulnerability CVSS: 5.0 03 May 2022, 18:15 UTC

Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim's HTTP request, get the victim's cookie, perform a base64 decode on the victim's cookie, and obtain a cleartext password, leading to getting API documentation for further API attacks.

CVE-2022-27263 strapi vulnerability CVSS: 7.5 12 Apr 2022, 17:15 UTC

An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file.

CVE-2022-0764 strapi vulnerability CVSS: 7.2 26 Feb 2022, 15:15 UTC

Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0.

CVE-2021-28128 strapi vulnerability CVSS: 5.5 06 May 2021, 14:15 UTC

In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password.

CVE-2020-27666 strapi vulnerability CVSS: 3.5 22 Oct 2020, 19:15 UTC

Strapi before 3.2.5 has stored XSS in the wysiwyg editor's preview feature.

CVE-2020-27665 strapi vulnerability CVSS: 5.0 22 Oct 2020, 19:15 UTC

In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes.

CVE-2020-27664 strapi vulnerability CVSS: 7.5 22 Oct 2020, 19:15 UTC

admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality.

CVE-2020-13961 strapi vulnerability CVSS: 4.0 19 Jun 2020, 17:15 UTC

Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails.

CVE-2020-8123 strapi vulnerability CVSS: 4.0 04 Feb 2020, 20:15 UTC

A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application.

CVE-2019-19609 strapi vulnerability CVSS: 9.0 05 Dec 2019, 20:15 UTC

The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.

CVE-2019-18818 strapi vulnerability CVSS: 7.5 07 Nov 2019, 22:15 UTC

strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js.