CVE-2021-28128 – strapi
Package
Manager: npm
Name: strapi
Vulnerable Version: >=0 <=3.6.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00259 pctl0.49057
Details
Weak Password Recovery Mechanism for Forgotten Password in Strapi In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password.
Metadata
Created: 2021-10-06T17:48:16Z
Modified: 2021-10-06T14:09:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/10/GHSA-37hx-4mcq-wc3h/GHSA-37hx-4mcq-wc3h.json
CWE IDs: ["CWE-640"]
Alternative ID: GHSA-37hx-4mcq-wc3h
Finding: F417
Auto approve: 1