VYPR
High severityNVD Advisory· Published Jun 20, 2024· Updated Oct 4, 2024

CVE-2024-37818

CVE-2024-37818

Description

Strapi v4.24.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /strapi.io/_next/image. This vulnerability allows attackers to scan for open ports or access sensitive information via a crafted GET request. NOTE: The Strapi Development Community argues that this issue is not valid. They contend that "the strapi/admin was wrongly attributed a flaw that only pertains to the strapi.io website, and which, at the end of the day, does not pose any real SSRF risk to applications that make use of the Strapi library."

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Server-Side Request Forgery in Strapi via /strapi.io/_next/image, disputed by the Strapi team.

CVE-2024-37818 reports a Server-Side Request Forgery (SSRF) vulnerability in Strapi v4.24.4, found in the /strapi.io/_next/image endpoint [1]. According to the initial disclosure, an attacker could craft a GET request to this component to scan for open ports or access sensitive information. However, the Strapi Development Community disputes the validity of this issue, stating that the flaw was wrongly attributed to the strapi/admin component and actually only affects the strapi.io website, not applications using the Strapi library [1]. As a result, they argue that this does not pose a real SSRF risk to Strapi users. No official patch or workaround has been provided, as the maintainers consider this a non-issue for the Strapi product itself.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.