Strapi is an open-source headless content management system. In versions from 5.0.0 to before 5.5.2, the lookup operator provided by the document service does not properly sanitize query parameters for private fields. An attacker can access private fields, including admin passwords and reset tokens, by crafting queries with the lookup parameter. This vulnerability is fixed in 5.5.2.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Strapi
Strapi strapi |
|
| Vendors & Products |
Strapi
Strapi strapi |
Thu, 16 Oct 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Strapi is an open-source headless content management system. In versions from 5.0.0 to before 5.5.2, the lookup operator provided by the document service does not properly sanitize query parameters for private fields. An attacker can access private fields, including admin passwords and reset tokens, by crafting queries with the lookup parameter. This vulnerability is fixed in 5.5.2. | |
| Title | Strapi Allows Unauthorized Access to Private Fields via parms.lookup | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-16T16:07:30.996Z
Updated: 2025-10-16T17:54:24.103Z
Reserved: 2024-12-16T18:04:39.983Z
Link: CVE-2024-56143
Updated: 2025-10-16T16:26:27.330Z
Status : Awaiting Analysis
Published: 2025-10-16T16:15:36.183
Modified: 2025-10-21T19:31:50.020
Link: CVE-2024-56143
No data.