CVE-2024-52588

Strapi is an open-source content management system. Prior to version 4.25.2, inputting a local domain into the Webhooks URL field leads to the application fetching itself, resulting in a server side request forgery (SSRF). This issue has been patched in version 4.25.2.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*

History

24 Jun 2025, 18:27

Type Values Removed Values Added
Summary
  • (es) Strapi es un sistema de gestión de contenido de código abierto. Antes de la versión 4.25.2, introducir un dominio local en el campo URL de Webhooks provocaba que la aplicación se recuperara a sí misma, lo que resultaba en un server side request forgery (SSRF). Este problema se ha corregido en la versión 4.25.2.
First Time Strapi
Strapi strapi
CPE cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*
References () https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf - () https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf - Exploit, Vendor Advisory
References () https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf - () https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf - Exploit, Vendor Advisory
First Time Strapi
Strapi strapi
CPE cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*

29 May 2025, 14:29

Type Values Removed Values Added
CPE cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*
References () https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf - Exploit, Vendor Advisory () https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf -

29 May 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-29 09:15

Updated : 2025-06-24 18:27


NVD link : CVE-2024-52588

Mitre link : CVE-2024-52588

CVE.ORG link : CVE-2024-52588


JSON object : View

Products Affected

strapi

  • strapi
CWE
CWE-918

Server-Side Request Forgery (SSRF)