First published: Wed Jul 13 2022(Updated: )
** DISPUTED ** An unrestricted file upload vulnerability in the Add New Assets function of Strapi 4.1.12 allows attackers to conduct XSS attacks via a crafted PDF file. NOTE: the project documentation suggests that a user with the Media Library "Create (upload)" permission is supposed to be able to upload PDF files containing JavaScript, and that all files in a public assets folder are accessible to the outside world (unless the filename begins with a dot character). The administrator can choose to allow only image, video, and audio files (i.e., not PDF) if desired.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Strapi Strapi | =4.1.12 | |
npm/@strapi/strapi | <=4.1.12 | |
=4.1.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32114 is an unrestricted file upload vulnerability in the Add New Assets function of Strapi 4.1.12 that allows attackers to conduct XSS attacks via a crafted PDF file.
The severity of CVE-2022-32114 is rated as high with a CVSS score of 8.8.
CVE-2022-32114 affects Strapi version 4.1.12.
An attacker can exploit CVE-2022-32114 by uploading a crafted PDF file through the Add New Assets function and conduct XSS attacks.
Strapi has not released any specific fixes or patches for CVE-2022-32114. It is recommended to follow secure coding practices and ensure user input is properly validated and sanitized.