CVE-2024-56143

Strapi is an open-source headless content management system. In versions from 5.0.0 to before 5.5.2, the lookup operator provided by the document service does not properly sanitize query parameters for private fields. An attacker can access private fields, including admin passwords and reset tokens, by crafting queries with the lookup parameter. This vulnerability is fixed in 5.5.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-10-16 16:15

Updated : 2025-12-31 01:05


NVD link : CVE-2024-56143

Mitre link : CVE-2024-56143

CVE.ORG link : CVE-2024-56143


JSON object : View

Products Affected

strapi

  • strapi
CWE
CWE-639

Authorization Bypass Through User-Controlled Key