Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/183045 | vdb entry third party advisory |
https://github.com/strapi/strapi/releases/tag/v3.0.2 | third party advisory release notes |
https://github.com/strapi/strapi/pull/6599 | third party advisory |