Strapi is an open-source content management system. Prior to version 4.25.2, inputting a local domain into the Webhooks URL field leads to the application fetching itself, resulting in a server side request forgery (SSRF). This issue has been patched in version 4.25.2.
References
Link | Resource |
---|---|
https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf | Exploit Vendor Advisory |
Configurations
History
24 Jun 2025, 18:27
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Strapi
Strapi strapi |
|
CPE | cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:* | |
References | () https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf - Exploit, Vendor Advisory | |
References | () https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf - Exploit, Vendor Advisory | |
First Time |
Strapi
Strapi strapi |
|
CPE | cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:* |
29 May 2025, 14:29
Type | Values Removed | Values Added |
---|---|---|
CPE | ||
References | () https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf - |
29 May 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-29 09:15
Updated : 2025-06-24 18:27
NVD link : CVE-2024-52588
Mitre link : CVE-2024-52588
CVE.ORG link : CVE-2024-52588
JSON object : View
Products Affected
strapi
- strapi
CWE
CWE-918
Server-Side Request Forgery (SSRF)