Leaking sensitive user information still possible by filtering on private with prefix fields
- Severity:
- High
Description
Still able to leak private fields if using the t(number) prefix
Recommendation
Update the @strapi/utils
package to the latest compatible version. Followings are version details:
- Affected version(s): <= 4.10.7
- Patched version(s): 4.10.8
References
Related Issues
- @pdfme/common vulnerable to to XSS and Prototype Pollution through its expression evaluation - CVE-2025-53626
- Strapi may leak sensitive user information, user reset password, tokens via content-manager views (GHSA-v8gg-4mq2-88q4) 2 - CVE-2023-36472
- Making all attributes on a content-type public without noticing it (GHSA-chmr-rg2f-9jmf) - CVE-2023-34093
- @saltcorn/server arbitrary file and directory listing when accessing build mobile app results - Vulnerability
- Tags:
- npm
- @strapi/utils
Anything's wrong? Let us know Last updated on November 04, 2023