Strapi Password Hashing is Missing Maximum Password Length Validation
- Severity:
- Medium
Description
Strapi’s password hashing implementation using bcryptjs lacks maximum password length validation. Since bcryptjs truncates passwords exceeding 72 bytes, this creates potential vulnerabilities such as authentication bypass and performance degradation.
Recommendation
Update the @strapi/core package to the latest compatible version. Followings are version details:
- Affected version(s): < 5.10.3
- Patched version(s): 5.10.3
References
Related Issues
- Strapi core vulnerable to sensitive data exposure via CORS misconfiguration - CVE-2025-53092
- CodeceptJS's incomprehensive sanitation can lead to Command Injection - CVE-2025-57285
- DuckDB NPM packages 1.3.3 and 1.29.2 briefly compromised with malware - CVE-2025-59037
- Payload does not invalidate JWTs after log out (GHSA-5v66-m237-hwf7) 2 - CVE-2025-4643
- Tags:
- npm
- @strapi/core
Anything's wrong? Let us know Last updated on November 27, 2025