Vulnerability Description
Strapi is an open source headless content management system. In Strapi versions prior to 5.45.0, the rate-limit middleware in the users-permissions plugin derived its rate-limit key in part from `ctx.request.body.email`, including on routes whose body schema does not contain an `email` field (`/auth/local`, `/auth/reset-password`, `/auth/change-password`). An unauthenticated attacker could include an arbitrary `email` value in the request body to obtain a fresh rate-limit key per request, effectively bypassing per-IP throttling on those routes and enabling high-volume credential brute-force, password-reset code brute-force, and credential-stuffing attempts. The rate-limit key was constructed as `${userIdentifier}:${requestPath}:${ctx.request.ip}`, where `userIdentifier = ctx.request.body.email`. On routes that legitimately use email as their identifier (e.g. `/auth/forgot-password`, `/auth/local/register`), this scoping is correct. On routes that use a different identifier (`identifier` for login, `code` for password reset, `currentPassword` for password change), the email field was not part of the route contract, but the middleware still incorporated it into the key, allowing a caller to rotate the value and obtain a unique key on every request. The patch in version 5.45.0 maintains an allow-list of routes that legitimately key on the email field and excludes that key component on every other route the middleware is mounted on. OAuth callback paths (`/connect/*`) are treated identifier-less. On routes outside the allow-list, the middleware now falls back to a fixed identifier-less key, ensuring per-IP throttling remains effective even when the request body is attacker-controlled.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Strapi | Strapi | < 5.45.0 |
Related Weaknesses (CWE)
References
- https://github.com/strapi/strapi/commit/5e0d243cba9830e6f791de6a94798bcde51468dbPatch
- https://github.com/strapi/strapi/pull/24818Issue Tracking
- https://github.com/strapi/strapi/releases/tag/v5.45.0PatchProduct
- https://github.com/strapi/strapi/security/advisories/GHSA-7mqx-wwh4-f9fwVendor Advisory
FAQ
What is CVE-2025-64526?
CVE-2025-64526 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Strapi is an open source headless content management system. In Strapi versions prior to 5.45.0, the rate-limit middleware in the users-permissions plugin derived its rate-limit key in part from `ctx....
How severe is CVE-2025-64526?
CVE-2025-64526 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-64526?
Check the references section above for vendor advisories and patch information. Affected products include: Strapi Strapi.