Strapi does not verify the access or ID tokens issued during the OAuth flow
- Severity:
- Medium
Description
Strapi 3.2.1 until 4.6.0 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the ‘None’ type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.
Recommendation
Update the @strapi/plugin-users-permissions
package to the latest compatible version. Followings are version details:
- Affected version(s): >= 3.2.1, < 4.6.0
- Patched version(s): 4.6.0
References
Related Issues
- Webrecorder packages are vulnerable to XSS through 404 error handling logic - CVE-2025-58765
- @strapi/plugin-users-permissions leaks 3rd party authentication tokens and authentication bypass - CVE-2024-34065
- DOM Clobbering Gadget found in astro's client-side router that leads to XSS - CVE-2024-47885
- @strapi/plugin-content-manager leaks data via relations via the Admin Panel - CVE-2024-29181
- Tags:
- npm
- @strapi/plugin-users-permissions
Anything's wrong? Let us know Last updated on November 08, 2023