Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2025-64526
Published:May 14, 2026
Updated:May 18, 2026
Strapi is an open source headless content management system. In Strapi versions prior to 5.45.0, the rate-limit middleware in the users-permissions plugin derived its rate-limit key in part from "ctx.request.body.email", including on routes whose body schema does not contain an "email" field ("/auth/local", "/auth/reset-password", "/auth/change-password"). An unauthenticated attacker could include an arbitrary "email" value in the request body to obtain a fresh rate-limit key per request, effectively bypassing per-IP throttling on those routes and enabling high-volume credential brute-force, password-reset code brute-force, and credential-stuffing attempts. The rate-limit key was constructed as "${userIdentifier}:${requestPath}:${ctx.request.ip}", where "userIdentifier = ctx.request.body.email". On routes that legitimately use email as their identifier (e.g. "/auth/forgot-password", "/auth/local/register"), this scoping is correct. On routes that use a different identifier ("identifier" for login, "code" for password reset, "currentPassword" for password change), the email field was not part of the route contract, but the middleware still incorporated it into the key, allowing a caller to rotate the value and obtain a unique key on every request. The patch in version 5.45.0 maintains an allow-list of routes that legitimately key on the email field and excludes that key component on every other route the middleware is mounted on. OAuth callback paths ("/connect/*") are treated identifier-less. On routes outside the allow-list, the middleware now falls back to a fixed identifier-less key, ensuring per-IP throttling remains effective even when the request body is attacker-controlled.
Affected Packages
https://github.com/strapi/strapi.git (GITHUB):
Affected version(s) >=v1.0.0 <v5.45.0
Fix Suggestion:
Update to version v5.45.0
@strapi/plugin-users-permissions (NPM):
Affected version(s) >=0.0.0-a3d182e0454ccff2702450b31621cd5026b389ca <5.45.0
Fix Suggestion:
Update to version 5.45.0
@strapi/plugin-users-permissions (NPM):
Affected version(s) >=0.0.0-0aec9b313e84cebcbd4d2cae07cdd3837003f20b <5.45.0
Fix Suggestion:
Update to version 5.45.0
Do you need more information?
Contact Us
CVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
NONE
Vulnerable System Availability
LOW
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
5.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
LOW
Weakness Type (CWE)
Improper Restriction of Excessive Authentication Attempts
EPSS
Base Score:
0.04