-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| strapi | npm | <= 3.6.10 |
The vulnerability exists in file upload handling where user-controlled input (file metadata) is stored and later rendered unsafely. The primary suspect is the upload controller that processes file metadata without sanitization. The findPage service is implicated as it likely retrieves and serves the tainted data to the admin panel. While exact code isn't available, Strapi's plugin architecture and vulnerability pattern strongly suggest these components are involved in the XSS chain from input processing to unsafe rendering.
KEV Misses 88% of Exploited CVEs- Get the report