A CORS misconfiguration vulnerability exists in default installations of Strapi where attacker-controlled origins are improperly reflected in API responses.
By default, Strapi reflects the value of the Origin header back in the Access-Control-Allow-Origin response header without proper validation or whitelisting.
Example:
Origin: http://localhost:8888
Access-Control-Allow-Origin: http://localhost:8888
Access-Control-Allow-Credentials: true
This allows an attacker-controlled site (on a different port, like 8888) to send credentialed requests to the Strapi backend on 1337.
{
"nvd_published_at": "2025-10-16T17:15:33Z",
"cwe_ids": [
"CWE-200",
"CWE-284",
"CWE-364",
"CWE-942"
],
"github_reviewed_at": "2025-10-16T19:49:01Z",
"severity": "HIGH",
"github_reviewed": true
}