The Strapi Protected Populate Plugin protects `get` endpoints from revealing too much information. Prior to version 1.3.4, users were able to bypass the field level security. Users who tried to populate something that they didn't have access to could populate those fields anyway. This issue has been patched in version 1.3.4. There are no known workarounds.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-2899 | The Strapi Protected Populate Plugin protects `get` endpoints from revealing too much information. Prior to version 1.3.4, users were able to bypass the field level security. Users who tried to populate something that they didn't have access to could populate those fields anyway. This issue has been patched in version 1.3.4. There are no known workarounds. |
![]() |
GHSA-6h67-934r-82g7 | Bypass of field access control in strapi-plugin-protected-populate |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T21:23:39.034Z
Reserved: 2023-11-13T13:25:18.479Z
Link: CVE-2023-48218

No data.

Status : Modified
Published: 2023-11-20T17:15:13.543
Modified: 2024-11-21T08:31:13.880
Link: CVE-2023-48218

No data.

No data.