VYPR
High severityNVD Advisory· Published Dec 5, 2019· Updated Aug 5, 2024

CVE-2019-19609

CVE-2019-19609

Description

The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Strapi framework before 3.0.0-beta.17.8 allows remote code execution via unsanitized plugin names in the admin panel's Install and Uninstall Plugin components.

Vulnerability

Overview

CVE-2019-19609 is a remote code execution (RCE) vulnerability in the Strapi framework, affecting versions prior to 3.0.0-beta.17.8. The flaw exists in the Install and Uninstall Plugin components of the admin panel. Strapi fails to sanitize the plugin name input before passing it to the execa function, which executes shell commands. An attacker can inject arbitrary shell commands through a crafted plugin name, leading to RCE on the server [1][3].

Exploitation

Details

To exploit this vulnerability, an attacker must have access to the Strapi admin panel, as the Install and Uninstall Plugin functionality is only available to authenticated administrators. Because the plugin name is not sanitized, the attacker can supply a malicious string containing shell metacharacters. The execa function then executes this input as a shell command, allowing arbitrary command injection. No additional authentication or network position is required beyond valid admin credentials [1][2].

Impact

Successful exploitation grants the attacker the ability to execute arbitrary operating system commands with the privileges of the Strapi process. This can lead to full compromise of the server, including data exfiltration, installation of backdoors, or lateral movement within the network. The vulnerability is critical due to the high privileges typically associated with the Strapi admin panel and the ease of exploitation once an attacker gains access [1][2][3].

Mitigation

Strapi patched this vulnerability in version 3.0.0-beta.17.8 by adding input sanitization for plugin names. Users are strongly advised to upgrade to this version or later. For instances that cannot be immediately patched, restricting access to the admin panel to trusted users and monitoring for unusual plugin installation attempts are recommended as interim mitigation measures [1][3].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
strapinpm
< 3.0.0-beta.17.83.0.0-beta.17.8

Affected products

2
  • Strapi/Strapi frameworkdescription
  • ghsa-coords
    Range: < 3.0.0-beta.17.8

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.