Home / Companies / Strapi / Blog / Post Details
Content Deep Dive

Security Disclosure of Vulnerabilities: CVE-2025-3930, CVE-2025-53092, CVE-2025-25298, CVE-2024-56143, and CVE-2024-52588

Blog post from Strapi

Post Details
Company
Date Published
Author
Derrick Mehaffy
Word Count
1,409
Language
English
Hacker News Points
-
Summary

Strapi has addressed five security vulnerabilities, including CVE-2025-3930, CVE-2025-53092, CVE-2025-25298, CVE-2024-56143, and CVE-2024-52588, following responsible disclosure protocols. These vulnerabilities ranged from issues like JWT expiration after logout, CORS misconfigurations, weak password validation, unauthorized access to private fields, and server-side request forgery in the webhook function. The company has released patches and recommends users update their Strapi packages to secure versions, emphasizing the importance of upgrading to mitigate risks. The Strapi team acknowledged the contributions of community members and security researchers in identifying these issues and reaffirmed their commitment to responsible disclosure, ensuring vulnerabilities are patched before public disclosure to protect users from potential exploitation.