An unrestricted file upload vulnerability in the Add New Assets function of Strapi 4.1.12 allows attackers to conduct XSS attacks via a crafted PDF file. NOTE: the project documentation suggests that a user with the Media Library "Create (upload)" permission is supposed to be able to upload PDF files containing JavaScript, and that all files in a public assets folder are accessible to the outside world (unless the filename begins with a dot character). The administrator can choose to allow only image, video, and audio files (i.e., not PDF) if desired.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T16:32:42.016Z
Reserved: 2022-05-31T00:00:00.000Z
Link: CVE-2022-32114

No data.

Status : Modified
Published: 2022-07-13T21:15:08.083
Modified: 2024-11-21T07:05:47.067
Link: CVE-2022-32114

No data.