{"api_version":"1","generated_at":"2026-05-15T05:03:05+00:00","cve":"CVE-2022-29894","urls":{"html":"https://cve.report/CVE-2022-29894","api":"https://cve.report/api/cve/CVE-2022-29894.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-29894","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-29894"},"summary":{"title":"CVE-2022-29894","description":"Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege.","state":"PUBLIC","assigner":"vultures@jpcert.or.jp","published_at":"2022-06-13 05:15:00","updated_at":"2022-06-22 12:12:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://jvn.jp/en/jp/JVN44550983/index.html","name":"https://jvn.jp/en/jp/JVN44550983/index.html","refsource":"MISC","tags":[],"title":"JVN#44550983: Strapi vulnerable to cross-site scripting","mime":"text/xml","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/strapi/strapi","name":"https://github.com/strapi/strapi","refsource":"MISC","tags":[],"title":"GitHub - strapi/strapi: ???? Open source Node.js Headless CMS to easily build customisable APIs","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://strapi.io/","name":"https://strapi.io/","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-29894","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29894","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"29894","vulnerable":"1","versionEndIncluding":"3.6.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"strapi","cpe5":"strapi","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-29894","ASSIGNER":"vultures@jpcert.or.jp","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Strapi","product":{"product_data":[{"product_name":"Strapi","version":{"version_data":[{"version_value":"v3.x.x versions and earlier"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Cross-site scripting"}]}]},"references":{"reference_data":[{"url":"https://strapi.io/","refsource":"MISC","name":"https://strapi.io/"},{"url":"https://github.com/strapi/strapi","refsource":"MISC","name":"https://github.com/strapi/strapi"},{"url":"https://jvn.jp/en/jp/JVN44550983/index.html","refsource":"MISC","name":"https://jvn.jp/en/jp/JVN44550983/index.html"}]},"description":{"description_data":[{"lang":"eng","value":"Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege."}]}},"nvd":{"publishedDate":"2022-06-13 05:15:00","lastModifiedDate":"2022-06-22 12:12:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":4.8,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.7,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*","versionEndIncluding":"3.6.10","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}