First published: Thu Oct 22 2020(Updated: )
Strapi before 3.2.5 has stored XSS in the wysiwyg editor's preview feature.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm/strapi-plugin-content-manager | <3.2.5 | 3.2.5 |
Strapi Strapi | <3.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27666 is a vulnerability in Strapi before version 3.2.5 that allows for stored cross-site scripting (XSS) in the wysiwyg editor's preview feature.
CVE-2020-27666 has a severity rating of 5.4, which is considered medium.
To fix CVE-2020-27666, update your Strapi installation to version 3.2.5 or later.
You can find more information about CVE-2020-27666 on the NIST National Vulnerability Database (NVD) at https://nvd.nist.gov/vuln/detail/CVE-2020-27666.
CVE-2020-27666 is classified as CWE-79, which is the code for Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').