GHSA-9329-mxxw-qwf8

Suggest an improvement
Source
https://github.com/advisories/GHSA-9329-mxxw-qwf8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-9329-mxxw-qwf8/GHSA-9329-mxxw-qwf8.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-9329-mxxw-qwf8
Aliases
Published
2025-10-16T19:49:01Z
Modified
2026-02-03T03:03:57.813541Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Strapi core vulnerable to sensitive data exposure via CORS misconfiguration
Details

Summary

A CORS misconfiguration vulnerability exists in default installations of Strapi where attacker-controlled origins are improperly reflected in API responses.

Technical Details

By default, Strapi reflects the value of the Origin header back in the Access-Control-Allow-Origin response header without proper validation or whitelisting.

Example: Origin: http://localhost:8888 Access-Control-Allow-Origin: http://localhost:8888 Access-Control-Allow-Credentials: true

This allows an attacker-controlled site (on a different port, like 8888) to send credentialed requests to the Strapi backend on 1337.

Suggested Fix

  1. Explicitly whitelist trusted origins
  2. Avoid reflecting dynamic origins
Database specific
{
    "nvd_published_at": "2025-10-16T17:15:33Z",
    "cwe_ids": [
        "CWE-200",
        "CWE-284",
        "CWE-364",
        "CWE-942"
    ],
    "github_reviewed_at": "2025-10-16T19:49:01Z",
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

npm / @strapi/core

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.20.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-9329-mxxw-qwf8/GHSA-9329-mxxw-qwf8.json"