| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| @strapi/strapi | npm | = 4.24.4 |
The vulnerability manifests in the image processing endpoint (/strapi.io/_next/image) which is characteristic of Next.js image optimization. The reproduction steps demonstrate that input validation failures in the URL parameter handling allow internal network access. While exact implementation details aren't available, the pattern matches Next.js image optimization behavior where user-controlled URLs are fetched without adequate restrictions. The Strapi admin UI likely integrates this functionality without additional safeguards, making the image processor the vulnerable component. The high confidence comes from clear attack patterns matching SSRF via unvalidated URL fetching, though the exact file path remains inferred due to limited code visibility.
KEV Misses 88% of Exploited CVEs- Get the report