Description
Strapi is an open-source headless content management system. Prior to version 4.11.7, an unauthorized actor can get access to user reset password tokens if they have the configure view permissions. The `/content-manager/relations` route does not remove private fields or ensure that they can't be selected. This issue is fixed in version 4.11.7.
Remediation
References
https://github.com/strapi/strapi/releases/tag/v4.11.7
https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4
Related Vulnerabilities
CVE-2020-7661 Vulnerability in maven package org.webjars.npm:url-regex
CVE-2018-14720 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2020-7625 Vulnerability in npm package op-browser
CVE-2021-25929 Vulnerability in maven package org.opennms:opennms-webapp
CVE-2020-27219 Vulnerability in maven package org.eclipse.hawkbit:hawkbit-update-server