CVE-2020-27664
Description
admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Strapi before 3.2.5 contains an unauthenticated server-side request forgery (SSRF) via the /proxy?url= endpoint.
The vulnerability resides in admin/src/containers/InputModalStepperProvider/index.js within Strapi versions prior to 3.2.5. The code exposes a /proxy?url= endpoint that proxies arbitrary URLs without proper validation or authorization checks [1][2]. This endpoint was originally intended to proxy file uploads from external URLs, but the fix removed the use of the insecure proxy, changing the request to directly access the file URL instead of routing through the proxy [2].
An attacker with network access to the Strapi admin panel can exploit this issue by crafting requests to the /proxy?url= endpoint, supplying any internal or external URL as the value of the url parameter. The Strapi backend will then fetch that URL and return its contents to the attacker, effectively creating an open proxy. The official release notes state the vulnerability is only exploitable by a user with admin panel access and the right permissions [3].
Successful exploitation allows an attacker to perform server-side request forgery (SSRF), potentially accessing internal services, cloud metadata endpoints, or other resources behind the firewall that would otherwise be inaccessible. The impact is limited to the privileges of the Strapi server process.
The vulnerability was patched in Strapi version 3.2.5, released on October 22, 2020. The fix removes the proxy functionality entirely [2][3]. Users should upgrade to version 3.2.5 or later to mitigate this issue.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
strapinpm | < 3.2.5 | 3.2.5 |
Affected products
2- Strapi/Strapidescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-7frv-9phw-vrvrghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-27664ghsaADVISORY
- github.com/strapi/strapi/pull/8442ghsax_refsource_MISCWEB
- github.com/strapi/strapi/releases/tag/v3.2.5ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.