Strapi Improper Rate Limiting vulnerability
Description
Strapi is the an open-source headless content management system. Prior to version 4.12.1, there is a rate limit on the login function of Strapi's admin screen, but it is possible to circumvent it. Therefore, the possibility of unauthorized login by login brute force attack increases. Version 4.12.1 has a fix for this issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Rate-limit circumvention in Strapi admin login via path manipulation allows brute-force attacks.
Vulnerability
CVE-2023-38507 describes an improper rate-limiting vulnerability in Strapi, an open-source headless CMS, prior to version 4.12.1. The admin login endpoint /admin/auth/login enforces a rate limit, but an attacker can bypass it by manipulating the request path—for example, by changing the case of characters (e.g., /admin/Login) or appending a trailing slash (/admin/auth/login/). This allows an unlimited number of login attempts [1][3].
Exploitation
The vulnerability can be exploited without authentication by sending repeated login requests to the admin endpoint. A proof-of-concept (PoC) provided in the advisory demonstrates sending 30 incorrect logins, which triggers the rate limit (HTTP 429). However, by simply altering the path to a case-variated form (e.g., /admin/Login) or adding a trailing slash, the rate limit is circumvented, and subsequent login attempts succeed (HTTP 200) [3]. The attack only requires network access to the Strapi admin interface and knowledge of a valid email address.
Impact
Successful exploitation enables brute-force password guessing against the admin account. If the attacker guesses the correct password, they gain unauthorized access to the Strapi admin panel, potentially leading to full compromise of the CMS, including content manipulation, user account control, and further server-side attacks [2].
Mitigation
The issue is fixed in Strapi version 4.12.1 [4]. Users are strongly advised to upgrade immediately. No workarounds are documented; restricting network access to the admin panel can reduce exposure but does not fix the rate-limit bypass itself. The vulnerability appears on public exploit repositories, increasing the urgency for patching.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@strapi/adminnpm | < 4.12.1 | 4.12.1 |
@strapi/plugin-users-permissionsnpm | < 4.12.1 | 4.12.1 |
Affected products
3- ghsa-coords2 versions
< 4.12.1+ 1 more
- (no CPE)range: < 4.12.1
- (no CPE)range: < 4.12.1
- strapi/strapiv5Range: < 4.12.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-24q2-59hm-rh9rghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-38507ghsaADVISORY
- github.com/strapi/strapi/blob/32d68f1f5677ed9a9a505b718c182c0a3f885426/packages/core/admin/server/middlewares/rateLimit.jsghsax_refsource_MISCWEB
- github.com/strapi/strapi/releases/tag/v4.12.1ghsax_refsource_MISCWEB
- github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9rghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.