CVE-2023-34235
CVSS Score of 10 (low)
Details
Summary
CVE-2023-34235: Strapi, an open-source headless content management system, prior to version 4.10.8 is vulnerable to information exposure. By using the `t(number)` prefix in the Knex query, it is possible to leak private fields. Changing the prefix to match the original or another table can bypass filtering protections and expose sensitive information like admin passwords and reset tokens. The vulnerability has a high severity rating (CVSS score of 7.5) and can be exploited remotely with no privileges required. Upgrading to version 4.10.8 resolves this issue. The vulnerability affects multiple products and has a potential impact on organizations' confidentiality.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions