Description
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-49vv-6q7q-w5cf | OS Command Injection in Strapi |
Github GHSA |
GHSA-9p2w-rmx4-9mw7 | Command Injection in strapi |
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:25:11.498Z
Reserved: 2019-12-05T00:00:00.000Z
Link: CVE-2019-19609
No data.
Status : Modified
Published: 2019-12-05T20:15:10.200
Modified: 2024-11-21T04:35:03.000
Link: CVE-2019-19609
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA