Description
An unrestricted file upload vulnerability in the Add New Assets function of Strapi 4.1.12 allows attackers to conduct XSS attacks via a crafted PDF file. NOTE: the project documentation suggests that a user with the Media Library "Create (upload)" permission is supposed to be able to upload PDF files containing JavaScript, and that all files in a public assets folder are accessible to the outside world (unless the filename begins with a dot character). The administrator can choose to allow only image, video, and audio files (i.e., not PDF) if desired.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4vm8-j95f-j6v5 | Strapi 4.1.12 Cross-site Scripting via crafted file |
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T16:32:42.016Z
Reserved: 2022-05-31T00:00:00.000Z
Link: CVE-2022-32114
No data.
Status : Modified
Published: 2022-07-13T21:15:08.083
Modified: 2024-11-21T07:05:47.067
Link: CVE-2022-32114
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA