Lucene search

K
cve[email protected]CVE-2023-22621
HistoryApr 19, 2023 - 4:15 p.m.

CVE-2023-22621

2023-04-1916:15:07
CWE-74
web.nvd.nist.gov
104
strapi
ssti
code execution
security vulnerability
cve-2023-22621

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

79.6%

Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution.

Affected configurations

NVD
Node
strapistrapiRange3.0.04.5.6
CPENameOperatorVersion
strapi:strapistrapilt4.5.6

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

79.6%