Description
Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2720 | Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails. |
Github GHSA |
GHSA-65wv-528r-m892 | Improper Input Validation in strapi |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:32:14.323Z
Reserved: 2020-06-08T00:00:00.000Z
Link: CVE-2020-13961
No data.
Status : Modified
Published: 2020-06-19T17:15:14.147
Modified: 2024-11-21T05:02:14.807
Link: CVE-2020-13961
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA