The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-49vv-6q7q-w5cf | OS Command Injection in Strapi |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:25:11.498Z
Reserved: 2019-12-05T00:00:00
Link: CVE-2019-19609
No data.
Status : Modified
Published: 2019-12-05T20:15:10.200
Modified: 2024-11-21T04:35:03.000
Link: CVE-2019-19609
No data.
OpenCVE Enrichment
No data.
Github GHSA