CVE-2023-34235

CVSS Score of 10 (low)

Details

Published Jul 25, 2023
Updated: Aug 2, 2023
CWE ID 200

Summary

CVE-2023-34235: Strapi, an open-source headless content management system, prior to version 4.10.8 is vulnerable to information exposure. By using the `t(number)` prefix in the Knex query, it is possible to leak private fields. Changing the prefix to match the original or another table can bypass filtering protections and expose sensitive information like admin passwords and reset tokens. The vulnerability has a high severity rating (CVSS score of 7.5) and can be exploited remotely with no privileges required. Upgrading to version 4.10.8 resolves this issue. The vulnerability affects multiple products and has a potential impact on organizations' confidentiality.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-34235 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions