CVE-2023-22893
HIGH EXPLOITED NUCLEIStrapi < 4.6.0 - Authentication Bypass
Title source: ruleDescription
Strapi through 4.5.5 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the 'None' type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.
Nuclei Templates (1)
Strapi Versions <=4.5.6 - Authentication Bypass
HIGHVERIFIEDby iamnoooob,rootxharsh,pdresearch
FOFA:
app="strapi-Headless-CMS"
Scores
CVSS v3
7.5
EPSS
0.7729
EPSS Percentile
99.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2025-06-23
CWE
CWE-287
Status
published
Products (2)
strapi/plugin-users-permissions
3.2.1 - 4.6.0npm
strapi/strapi
3.0.0 - 4.6.0
Published
Apr 19, 2023
Tracked Since
Feb 18, 2026