Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-22707— Strapi Upload Plugin MIME Validation Bypass via Content API

Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-22707

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Strapi Upload Plugin MIME Validation Bypass via Content API
Source: NVD (National Vulnerability Database)
Vulnerability Description
Strapi is an open source headless content management system. In Strapi versions prior to 5.33.3, the Upload plugin's Content API endpoints did not enforce the administrator-configured MIME type restrictions (`plugin.upload.security.allowedTypes` and `deniedTypes`). The same restrictions were correctly enforced on the Admin Panel upload path. The upload plugin's `enforceUploadSecurity` security check was invoked in the admin upload controller but was missing from the Content API controller. The Content API handlers `uploadFiles` and `replaceFile` (and the `upload` wrapper that dispatches to them) called the underlying upload service directly, bypassing both the magic-byte MIME detection and the configured allow/deny lists. An authenticated user with the Content API upload permission could therefore upload file types the administrator had explicitly disallowed, including HTML and SVG content. In deployments serving uploaded files from the same origin as the admin panel (default), an attacker could upload an HTML or SVG file that, when opened directly by an admin, executed JavaScript in the admin origin, enabling admin-session hijack and authenticated administrative actions against the admin API. The patch in version 5.33.3 introduces a shared `prepareUploadRequest` helper that wraps `enforceUploadSecurity` and is called from both the Content API and admin upload controllers, ensuring identical security policy enforcement on every upload entry point.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
危险类型文件的不加限制上传
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
strapistrapi < 5.33.3 -
strapi@strapi/upload < 5.33.3 -

II. Public POCs for CVE-2026-22707

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-22707

登录查看更多情报信息。

Same Patch Batch · strapi · 2026-05-14 · 5 CVEs total

CVE-2026-22706Strapi: Password Reset Does Not Revoke Existing Refresh Sessions
CVE-2026-22599Strapi Vulnerable to SQL Injection in Content Type Builder
CVE-2026-27886Strapi may leak sensitive data via relational filtering due to lack of query sanitization
CVE-2025-64526Strapi has a rate limit bypass on users-permissions plugin via attacker-controlled email k

IV. Related Vulnerabilities

V. Comments for CVE-2026-22707

No comments yet


Leave a comment