Description
Strapi is an open-source headless content management system. In versions from 5.0.0 to before 5.5.2, the lookup operator provided by the document service does not properly sanitize query parameters for private fields. An attacker can access private fields, including admin passwords and reset tokens, by crafting queries with the lookup parameter. This vulnerability is fixed in 5.5.2.
Exploits (1)
github
WORKING POC
1 stars
by exploitintel · pythonpoc
https://github.com/exploitintel/eip-pocs-and-cves/tree/main/CVE-2024-56143
Scores
CVSS v3
8.2
EPSS
0.0002
EPSS Percentile
6.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Lab Environment
vulnerable
docker pull ghcr.io/exploitintel/cve-2024-56143-vulnerable:latest
Classification
CWE
CWE-639
Status
published
Affected Products (2)
strapi/strapi
< 5.5.2
strapi/core
< 5.5.2npm
Timeline
Published
Oct 16, 2025
Tracked Since
Feb 18, 2026