CVE-2019-19609

HIGH EXPLOITED IN THE WILD

Strapi <3.0.0-beta.17.8 - RCE

Title source: llm

Description

The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.

Exploits (9)

exploitdb WORKING POC
by David Utón · pythonwebappsmultiple
https://www.exploit-db.com/exploits/50238
nomisec WORKING POC 9 stars
by diego-tella · remote-auth
https://github.com/diego-tella/CVE-2019-19609-EXPLOIT
nomisec WORKING POC 7 stars
by ebadfd · remote-auth
https://github.com/ebadfd/CVE-2019-19609
nomisec WORKING POC 2 stars
by glowbase · poc
https://github.com/glowbase/CVE-2019-19609
nomisec WORKING POC
by RamPanic · remote
https://github.com/RamPanic/CVE-2019-19609-EXPLOIT
nomisec WORKING POC
by n000xy · remote
https://github.com/n000xy/CVE-2019-19609-POC-Python
nomisec WORKING POC
by D3m0nicw0lf · remote
https://github.com/D3m0nicw0lf/CVE-2019-19609
nomisec WORKING POC
by guglia001 · remote
https://github.com/guglia001/CVE-2019-19609
vulncheck_xdb WORKING POC
remote
https://github.com/Hackhoven/Strapi-RCE

Scores

CVSS v3 7.2
EPSS 0.8113
EPSS Percentile 99.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2023-03-21
InTheWild.io 2024-05-17
CWE
CWE-78
Status published
Products (2)
npm/strapi 0 - 3.0.0-beta.17.8npm
strapi/strapi 3.0.0 alpha10.1 (49 CPE variants)
Published Dec 05, 2019
Tracked Since Feb 18, 2026