Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. strapi
  4. ›
  5. CVE-2023-38507

CVE-2023-38507: Allocation of Resources Without Limits or Throttling

September 15, 2023 (updated September 21, 2023)

Strapi is the an open-source headless content management system. Prior to version 4.12.1, there is a rate limit on the login function of Strapi’s admin screen, but it is possible to circumvent it. Therefore, the possibility of unauthorized login by login brute force attack increases. Version 4.12.1 has a fix for this issue.

References

  • github.com/strapi/strapi/blob/32d68f1f5677ed9a9a505b718c182c0a3f885426/packages/core/admin/server/middlewares/rateLimit.js
  • github.com/strapi/strapi/releases/tag/v4.12.1
  • github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9r
  • nvd.nist.gov/vuln/detail/CVE-2023-38507

Code Behaviors & Features

Detect and mitigate CVE-2023-38507 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.12.1

Solution

Unfortunately, there is no solution available yet.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

npm/strapi/CVE-2023-38507.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:15 +0000.