Description
Strapi is an open-source headless content management system. Prior to version 4.11.7, an unauthorized actor can get access to user reset password tokens if they have the configure view permissions. The `/content-manager/relations` route does not remove private fields or ensure that they can't be selected. This issue is fixed in version 4.11.7.
Remediation
References
https://github.com/strapi/strapi/releases/tag/v4.11.7
https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4
Related Vulnerabilities
CVE-2022-37223 Vulnerability in maven package com.jflyfox:jflyfox_jfinal
CVE-2020-28461 Vulnerability in npm package js-ini
CVE-2020-14968 Vulnerability in maven package org.webjars.bowergithub.kjur:jsrsasign
CVE-2021-41246 Vulnerability in npm package express-openid-connect
CVE-2022-31367 Vulnerability in npm package strapi-plugin-content-manager