CVE-2022-31367: Strapi mishandles hidden attributes within admin API responses
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.39522%
CWE
Published
9/28/2022
Updated
2/2/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
strapi | npm | < 3.6.10 | 3.6.10 |
@strapi/strapi | npm | >= 4.0.0-next.0, < 4.1.10 | 4.1.10 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper sanitization in admin API response handlers. Both versions failed to properly exclude hidden attributes marked in content-type configurations. The v3 sanitizeEntity function and v4 permissions-manager sanitize function were both patched in the referenced PRs (#13189 and #13185) to implement attribute filtering. The exploit demonstrates attackers could manipulate filter parameters (e.g., changing 'email_containss' to 'password_containss') to bypass intended data restrictions. The SQL Injection CWE mapping likely refers to column name injection rather than traditional SQLi, as attackers manipulated attribute names in filter operations to access hidden fields.