CVE-2023-34235
JavaScript vulnerability analysis and mitigation

Overview

Strapi, an open-source headless content management system, disclosed a vulnerability (CVE-2023-34235) prior to version 4.10.8. The vulnerability was discovered and patched in June 2023, affecting all versions before 4.10.8. The issue allowed potential leakage of private fields through the manipulation of table prefixes in database queries (NVD, GitHub Release).

Technical details

The vulnerability stems from improper handling of table prefixes in Knex queries. When using the t(number) prefix, attackers could manipulate queries to bypass filtering protections. For example, while password field was protected, t1.password could bypass these protections. This occurred because the query would change from filtering on password to filtering on t1.password, which wasn't properly secured by the filtering mechanisms (GitHub Advisory). The vulnerability received a CVSS v3.1 base score of 7.5 HIGH (NVD).

Impact

The vulnerability could lead to unauthorized access to sensitive information, including admin passwords and reset tokens. By exploiting this issue, attackers could perform filtering attacks on any object related to the database, potentially exposing private user information and sensitive system data (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in Strapi version 4.10.8. The fix included removing the getter for private attributes and improving sanitization in sanitizeQuery and convertQueryParams functions. Users are strongly advised to upgrade to version 4.10.8 or later to receive the security patch (GitHub Release).

Community reactions

The initial disclosure was handled carefully, with Strapi delaying the detailed public disclosure for four weeks after the patch release to give users time to upgrade. The vulnerability was classified as high severity but noted to have a very low probability of exploitation in the wild (GitHub Release).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-69264HIGH8.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69262HIGH7.5
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69263HIGH7.5
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2026-22028HIGH7.2
  • JavaScriptJavaScript
  • preact
NoYesJan 07, 2026
CVE-2025-9611HIGH7.2
  • JavaScriptJavaScript
  • @playwright/mcp
NoYesJan 07, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management