Home

Description

Strapi is an open-source headless content management system. In versions from 5.0.0 to before 5.5.2, the lookup operator provided by the document service does not properly sanitize query parameters for private fields. An attacker can access private fields, including admin passwords and reset tokens, by crafting queries with the lookup parameter. This vulnerability is fixed in 5.5.2.

PUBLISHED Reserved 2024-12-16 | Published 2025-10-16 | Updated 2025-10-16 | Assigner GitHub_M




HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

>= 5.0.0, < 5.5.2
affected

References

github.com/...strapi/security/advisories/GHSA-495j-h493-42q2

github.com/...ommit/0c6e0953ae1e62afae9329de7ae6d6a5e21b95b8

cve.org (CVE-2024-56143)

nvd.nist.gov (CVE-2024-56143)

Download JSON