Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-27886— Strapi may leak sensitive data via relational filtering due to lack of query sanitization

AI Predicted 9.8 Difficulty: Easy EPSS 0.11% · P29

Affected Version Matrix 1

VendorProductVersion RangeStatus
strapistrapi>= 4.0.0, < 5.37.0affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-27886

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Strapi may leak sensitive data via relational filtering due to lack of query sanitization
Source: NVD (National Vulnerability Database)
Vulnerability Description
Strapi is an open source headless content management system. Strapi versions starting in 4.0.0 and prior to 5.37.0 did not sufficiently sanitize query parameters when filtering content via relational fields. An unauthenticated attacker could use the `where` query parameter on any publicly-accessible content-type with an `updatedBy` (or other admin-relation) field to perform a boolean-oracle attack against private fields on the joined `admin_users` table, including the `resetPasswordToken` field. Extracting an admin reset token via this oracle made full administrative account takeover possible without authentication. When a filter such as `where[updatedBy][resetPasswordToken][$startsWith]=a` was applied to a public Content API endpoint, the underlying query generation performed a `LEFT JOIN` against the `admin_users` table and emitted a `WHERE` clause referencing the joined column. The query parameter sanitization layer did not block operator chains that traversed into relational target schemas the caller had no read permission on, allowing the response count to be used as a one-bit oracle on any admin-table field. The patch in version 5.37.0 introduces explicit query-parameter sanitization at the controller and service boundary via three new primitives: `strictParam`, `addQueryParams`, and `addBodyParams`. Operator chains that traverse into restricted relational targets are now rejected before reaching the database.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
strapistrapi >= 4.0.0, < 5.37.0 -

II. Public POCs for CVE-2026-27886

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-27886

登录查看更多情报信息。

Same Patch Batch · strapi · 2026-05-14 · 5 CVEs total

CVE-2026-22706Strapi: Password Reset Does Not Revoke Existing Refresh Sessions
CVE-2026-22707Strapi Upload Plugin MIME Validation Bypass via Content API
CVE-2026-22599Strapi Vulnerable to SQL Injection in Content Type Builder
CVE-2025-64526Strapi has a rate limit bypass on users-permissions plugin via attacker-controlled email k

IV. Related Vulnerabilities

V. Comments for CVE-2026-27886

No comments yet


Leave a comment