Description
Strapi is an open-source headless content management system. Prior to version 4.11.7, an unauthorized actor can get access to user reset password tokens if they have the configure view permissions. The `/content-manager/relations` route does not remove private fields or ensure that they can't be selected. This issue is fixed in version 4.11.7.
Remediation
References
https://github.com/strapi/strapi/releases/tag/v4.11.7
https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4
Related Vulnerabilities
CVE-2020-8123 Vulnerability in npm package strapi
CVE-2021-3765 Vulnerability in npm package validator
CVE-2023-34247 Vulnerability in npm package @keystone-6/auth
CVE-2020-8203 Vulnerability in maven package org.webjars.bower:lodash
CVE-2022-31139 Vulnerability in maven package io.github.karlatemp:unsafe-accessor