Strapi is an open source headless content management system. Strapi versions prior to 5.20.0 contain a CORS misconfiguration vulnerability in default installations. By default, Strapi reflects the value of the Origin header back in the Access-Control-Allow-Origin response header without proper validation or whitelisting. This allows an attacker-controlled site to send credentialed requests to the Strapi backend. An attacker can exploit this by hosting a malicious site on a different origin (e.g., different port) and sending requests with credentials to the Strapi API. The vulnerability is fixed in version 5.20.0. No known workarounds exist.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9329-mxxw-qwf8 Strapi core vulnerable to sensitive data exposure via CORS misconfiguration
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 16 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Oct 2025 16:45:00 +0000

Type Values Removed Values Added
Description Strapi is an open source headless content management system. Strapi versions prior to 5.20.0 contain a CORS misconfiguration vulnerability in default installations. By default, Strapi reflects the value of the Origin header back in the Access-Control-Allow-Origin response header without proper validation or whitelisting. This allows an attacker-controlled site to send credentialed requests to the Strapi backend. An attacker can exploit this by hosting a malicious site on a different origin (e.g., different port) and sending requests with credentials to the Strapi API. The vulnerability is fixed in version 5.20.0. No known workarounds exist.
Title Strapi core vulnerable to sensitive data exposure via CORS misconfiguration
Weaknesses CWE-200
CWE-284
CWE-364
CWE-942
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-10-16T18:13:08.618Z

Reserved: 2025-06-25T13:41:23.085Z

Link: CVE-2025-53092

cve-icon Vulnrichment

Updated: 2025-10-16T18:13:05.629Z

cve-icon NVD

Status : Received

Published: 2025-10-16T17:15:33.727

Modified: 2025-10-16T17:15:33.727

Link: CVE-2025-53092

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.