CVE-2019-19609
HIGH EXPLOITED IN THE WILDStrapi <3.0.0-beta.17.8 - RCE
Title source: llmDescription
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
Exploits (9)
exploitdb
WORKING POC
by David Utón · pythonwebappsmultiple
https://www.exploit-db.com/exploits/50238
nomisec
WORKING POC
9 stars
by diego-tella · remote-auth
https://github.com/diego-tella/CVE-2019-19609-EXPLOIT
References (4)
Scores
CVSS v3
7.2
EPSS
0.8113
EPSS Percentile
99.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2023-03-21
InTheWild.io
2024-05-17
CWE
CWE-78
Status
published
Products (2)
npm/strapi
0 - 3.0.0-beta.17.8npm
strapi/strapi
3.0.0 alpha10.1 (49 CPE variants)
Published
Dec 05, 2019
Tracked Since
Feb 18, 2026