Strapi Password Hashing is Missing Maximum Password Length Validation
- Severity:
- Medium
Description
Strapi’s password hashing implementation using bcryptjs lacks maximum password length validation. Since bcryptjs truncates passwords exceeding 72 bytes, this creates potential vulnerabilities such as authentication bypass and performance degradation.
Recommendation
Update the @strapi/core package to the latest compatible version. Followings are version details:
- Affected version(s): < 5.10.3
- Patched version(s): 5.10.3
References
Related Issues
- Strapi Allows Unauthorized Access to Private Fields via parms.lookup - CVE-2024-56143
- CodeceptJS's incomprehensive sanitation can lead to Command Injection - CVE-2025-57285
- DuckDB NPM packages 1.3.3 and 1.29.2 briefly compromised with malware - CVE-2025-59037
- Payload does not invalidate JWTs after log out (GHSA-5v66-m237-hwf7) 2 - CVE-2025-4643
- Tags:
- npm
- @strapi/core
Anything's wrong? Let us know Last updated on November 27, 2025