VYPR
High severityNVD Advisory· Published Sep 15, 2023· Updated Sep 25, 2024

Strapi Improper Rate Limiting vulnerability

CVE-2023-38507

Description

Strapi is the an open-source headless content management system. Prior to version 4.12.1, there is a rate limit on the login function of Strapi's admin screen, but it is possible to circumvent it. Therefore, the possibility of unauthorized login by login brute force attack increases. Version 4.12.1 has a fix for this issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Rate-limit circumvention in Strapi admin login via path manipulation allows brute-force attacks.

Vulnerability

CVE-2023-38507 describes an improper rate-limiting vulnerability in Strapi, an open-source headless CMS, prior to version 4.12.1. The admin login endpoint /admin/auth/login enforces a rate limit, but an attacker can bypass it by manipulating the request path—for example, by changing the case of characters (e.g., /admin/Login) or appending a trailing slash (/admin/auth/login/). This allows an unlimited number of login attempts [1][3].

Exploitation

The vulnerability can be exploited without authentication by sending repeated login requests to the admin endpoint. A proof-of-concept (PoC) provided in the advisory demonstrates sending 30 incorrect logins, which triggers the rate limit (HTTP 429). However, by simply altering the path to a case-variated form (e.g., /admin/Login) or adding a trailing slash, the rate limit is circumvented, and subsequent login attempts succeed (HTTP 200) [3]. The attack only requires network access to the Strapi admin interface and knowledge of a valid email address.

Impact

Successful exploitation enables brute-force password guessing against the admin account. If the attacker guesses the correct password, they gain unauthorized access to the Strapi admin panel, potentially leading to full compromise of the CMS, including content manipulation, user account control, and further server-side attacks [2].

Mitigation

The issue is fixed in Strapi version 4.12.1 [4]. Users are strongly advised to upgrade immediately. No workarounds are documented; restricting network access to the admin panel can reduce exposure but does not fix the rate-limit bypass itself. The vulnerability appears on public exploit repositories, increasing the urgency for patching.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
@strapi/adminnpm
< 4.12.14.12.1
@strapi/plugin-users-permissionsnpm
< 4.12.14.12.1

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.