Home

Description

Strapi is an open source headless content management system. Strapi versions prior to 5.20.0 contain a CORS misconfiguration vulnerability in default installations. By default, Strapi reflects the value of the Origin header back in the Access-Control-Allow-Origin response header without proper validation or whitelisting. This allows an attacker-controlled site to send credentialed requests to the Strapi backend. An attacker can exploit this by hosting a malicious site on a different origin (e.g., different port) and sending requests with credentials to the Strapi API. The vulnerability is fixed in version 5.20.0. No known workarounds exist.

PUBLISHED Reserved 2025-06-25 | Published 2025-10-16 | Updated 2025-10-16 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

CWE-284: Improper Access Control

CWE-364: Signal Handler Race Condition

CWE-942: Permissive Cross-domain Policy with Untrusted Domains

Product status

< 5.20.0
affected

References

github.com/...strapi/security/advisories/GHSA-9329-mxxw-qwf8

cve.org (CVE-2025-53092)

nvd.nist.gov (CVE-2025-53092)

Download JSON