Vulnerability Details : CVE-2023-39345
Potential exploit
strapi is an open-source headless CMS. Versions prior to 4.13.1 did not properly restrict write access to fielded marked as private in the user registration endpoint. As such malicious users may be able to errantly modify their user records. This issue has been addressed in version 4.13.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Vulnerability category: BypassGain privilege
Products affected by CVE-2023-39345
- cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-39345
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-39345
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST | |
7.6
|
HIGH | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L |
2.8
|
4.7
|
GitHub, Inc. |
CWE ids for CVE-2023-39345
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-39345
-
https://github.com/strapi/strapi/security/advisories/GHSA-gc7p-j5xm-xxh2
Unauthorized Access to Private Fields in User Registration API · Advisory · strapi/strapi · GitHubExploit;Vendor Advisory
Jump to