Strapi is an open-source headless content management system. In versions from 5.0.0 to before 5.5.2, the lookup operator provided by the document service does not properly sanitize query parameters for private fields. An attacker can access private fields, including admin passwords and reset tokens, by crafting queries with the lookup parameter. This vulnerability is fixed in 5.5.2.
References
| Link | Resource |
|---|---|
| https://github.com/strapi/strapi/commit/0c6e0953ae1e62afae9329de7ae6d6a5e21b95b8 | Patch |
| https://github.com/strapi/strapi/security/advisories/GHSA-495j-h493-42q2 | Exploit Vendor Advisory |
Configurations
History
25 Nov 2025, 16:03
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:strapi:strapi:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/strapi/strapi/commit/0c6e0953ae1e62afae9329de7ae6d6a5e21b95b8 - Patch | |
| References | () https://github.com/strapi/strapi/security/advisories/GHSA-495j-h493-42q2 - Exploit, Vendor Advisory | |
| First Time |
Strapi strapi
Strapi |
16 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-16 16:15
Updated : 2025-11-25 16:03
NVD link : CVE-2024-56143
Mitre link : CVE-2024-56143
CVE.ORG link : CVE-2024-56143
JSON object : View
Products Affected
strapi
- strapi
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
