Sanitization Flaws in Strapi Headless CMS Affecting Multiple Versions
CVE-2026-27886
What is CVE-2026-27886?
Strapi, an open-source headless content management system, has a vulnerability in versions ranging from 4.0.0 to 5.36.0 that stems from inadequate sanitization of query parameters during content filtering. This flaw allows unauthenticated attackers to exploit the where query parameter on publicly-accessible content types with admin-relation fields, such as updatedBy. The attacker can perform a boolean-oracle attack against the private fields on the admin_users table, including fields like resetPasswordToken, leading potentially to complete administrative account takeover without the need for authentication. The issue arises from how the application handles operator chains that traverse restricted relational schemas. However, this vulnerability was addressed in version 5.37.0, which implemented enhanced query-parameter sanitization to prevent unauthorized access to restricted database fields.
Affected Version(s)
strapi >= 4.0.0, < 5.37.0
