Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-22599— Strapi Vulnerable to SQL Injection in Content Type Builder

Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-22599

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Strapi Vulnerable to SQL Injection in Content Type Builder
Source: NVD (National Vulnerability Database)
Vulnerability Description
Strapi is an open source headless content management system. In versions on the 4.x branch prior to 4.26.1 and on the 5.x branch prior to 5.33.2, a database-query injection vulnerability existed in the Strapi Content-Type Builder write API. An authenticated administrator could inject arbitrary database statements through the `column.defaultTo` attribute when creating or modifying a content type. Setting `defaultTo` as a tuple `[value, { isRaw: true }]` caused the value to be passed directly into Knex's `db.connection.raw()` during schema migration without sanitization, allowing arbitrary statement execution at the database layer. Depending on the database engine, this enabled arbitrary file read via database utility functions, denial of service via forced server crash on schema-migration error, and on engines that permit external program execution, remote code execution against the database server. The patch in versions 4.26.1 and 5.33.2 addresses this by restricting all Content-Type Builder write APIs to development mode only. Production deployments running v5.33.2 or later return 404 for requests against `/content-type-builder/content-types` and related endpoints, removing the network-reachable attack surface entirely.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
strapistrapi >= 5.0.0, < 5.33.2 -
strapi@strapi/content-type-builder >= 5.0.0, < 5.33.2 -

II. Public POCs for CVE-2026-22599

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-22599

登录查看更多情报信息。

Same Patch Batch · strapi · 2026-05-14 · 5 CVEs total

CVE-2026-22706Strapi: Password Reset Does Not Revoke Existing Refresh Sessions
CVE-2026-22707Strapi Upload Plugin MIME Validation Bypass via Content API
CVE-2026-27886Strapi may leak sensitive data via relational filtering due to lack of query sanitization
CVE-2025-64526Strapi has a rate limit bypass on users-permissions plugin via attacker-controlled email k

IV. Related Vulnerabilities

V. Comments for CVE-2026-22599

No comments yet


Leave a comment