CVE-2022-29894
Description
Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Strapi v3.x.x and earlier contain a stored XSS vulnerability in the file upload function, allowing arbitrary script execution in an admin's browser.
Vulnerability
Overview
CVE-2022-29894 is a stored cross-site scripting (XSS) vulnerability in Strapi versions 3.x.x and earlier. The flaw resides in the file upload function, where an attacker can inject malicious scripts that are stored on the server and later executed in the browser of an authenticated administrator [1][2]. This is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) [2].
Exploitation
Prerequisites
To exploit this vulnerability, an attacker must have a valid account with the ability to upload files (e.g., a content manager role). The attack is network-based (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) and requires user interaction—the admin must view the page containing the malicious file [2]. No special network position is needed beyond access to the Strapi admin panel.
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the admin's browser session. This can lead to theft of session cookies, defacement of the admin interface, or further actions such as creating new admin accounts or modifying content [1][2]. The impact is limited to the admin's browser and does not directly affect the server or other users.
Mitigation
Strapi has fixed this vulnerability in version 4.x.x. Users on v3.x.x are advised to upgrade to the latest v4 release, as v3.x.x is planned to reach end-of-life in September 2022 [2]. No workaround is provided; updating is the recommended solution.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
strapinpm | <= 3.6.10 | — |
Affected products
2- Strapi/Strapiv5Range: v3.x.x versions and earlier
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-mcqm-6ff4-53qxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-29894ghsaADVISORY
- jvn.jp/en/jp/JVN44550983/index.htmlghsax_refsource_MISCWEB
- strapi.ioghsaWEB
- strapi.iomitrex_refsource_MISC
News mentions
0No linked articles in our index yet.