An unrestricted file upload vulnerability in the Add New Assets function of Strapi 4.1.12 allows attackers to conduct XSS attacks via a crafted PDF file. NOTE: the project documentation suggests that a user with the Media Library "Create (upload)" permission is supposed to be able to upload PDF files containing JavaScript, and that all files in a public assets folder are accessible to the outside world (unless the filename begins with a dot character). The administrator can choose to allow only image, video, and audio files (i.e., not PDF) if desired.

Project Subscriptions

Vendors Products
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4vm8-j95f-j6v5 Strapi 4.1.12 Cross-site Scripting via crafted file
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00655}

epss

{'score': 0.00723}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00623}

epss

{'score': 0.00655}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-02-13T16:32:42.016Z

Reserved: 2022-05-31T00:00:00.000Z

Link: CVE-2022-32114

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-07-13T21:15:08.083

Modified: 2024-11-21T07:05:47.067

Link: CVE-2022-32114

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses