CVE-2023-22894

4.9 MEDIUM
Published: April 19, 2023 Modified: November 07, 2025

Description

Strapi through 4.5.5 allows attackers (with access to the admin panel) to discover sensitive user details by exploiting the query filter. The attacker can filter users by columns that contain sensitive information and infer a value from API responses. If the attacker has super admin access, then this can be exploited to discover the password hash and password reset token of all users. If the attacker has admin panel access to an account with permission to access the username and email of API users with a lower privileged role (e.g., Editor or Author), then this can be exploited to discover sensitive information for all API users but not other admin accounts.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/strapi/strapi/releases
Source: cve@mitre.org
Release Notes
https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve
Source: cve@mitre.org
Exploit Vendor Advisory
https://www.ghostccamm.com/blog/multi_strapi_vulns/
Source: cve@mitre.org
Exploit Third Party Advisory
https://github.com/strapi/strapi/releases
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Vendor Advisory
https://www.ghostccamm.com/blog/multi_strapi_vulns/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory

6 reference(s) from NVD

Quick Stats

CVSS v3 Score
4.9 / 10.0
EPSS (Exploit Probability)
17.6%
95th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

strapi