{"id":"CVE-2023-22893","details":"Strapi through 4.5.5 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the 'None' type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.","aliases":["GHSA-583x-23h9-f5w7"],"modified":"2026-03-14T12:00:36.044763Z","published":"2023-04-19T16:15:07.253Z","references":[{"type":"ADVISORY","url":"https://github.com/strapi/strapi/releases"},{"type":"EVIDENCE","url":"https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve"},{"type":"EVIDENCE","url":"https://www.ghostccamm.com/blog/multi_strapi_vulns/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/strapi/strapi","events":[{"introduced":"6bb7a7f198b13b0780547285d4214704ce991c23"},{"fixed":"a9e55435c489f3379d88565bf3f729deb29bfb45"}],"database_specific":{"versions":[{"introduced":"3.0.0"},{"fixed":"4.6.0"}]}}],"versions":["v3.0.0","v3.0.1","v3.0.2","v3.0.3","v3.0.4","v3.0.5","v3.0.6","v3.1.0","v3.1.1","v3.1.2","v3.1.3","v3.1.4","v3.1.5","v3.1.6","v3.1.7","v3.2.0","v3.2.1","v3.2.2","v3.2.3","v3.2.4","v3.2.5","v3.3.0","v3.3.1","v3.3.2","v3.3.3","v3.3.4","v3.4.0","v3.4.1","v3.4.2","v3.4.3","v3.4.4","v3.4.5","v3.4.6","v3.5.0","v3.5.1","v3.5.2","v3.5.3","v3.5.4","v3.6.0","v3.6.1","v3.6.2","v3.6.3","v3.6.4","v3.6.5","v3.6.6","v3.6.7","v3.6.8","v4.0.0","v4.0.0-beta.10","v4.0.0-beta.11","v4.0.0-beta.12","v4.0.0-beta.13","v4.0.0-beta.14","v4.0.0-beta.15","v4.0.0-beta.16","v4.0.0-beta.17","v4.0.0-beta.18","v4.0.0-beta.19","v4.0.0-beta.2","v4.0.0-beta.20","v4.0.0-beta.21","v4.0.0-beta.22","v4.0.0-beta.3","v4.0.0-beta.4","v4.0.0-beta.5","v4.0.0-beta.6","v4.0.0-beta.7","v4.0.0-beta.8","v4.0.0-beta.9","v4.0.1","v4.0.2","v4.0.3","v4.0.4","v4.0.5","v4.0.6","v4.0.7","v4.0.8","v4.1.0","v4.1.1","v4.1.10","v4.1.10-beta.0","v4.1.11","v4.1.12","v4.1.2","v4.1.3","v4.1.4","v4.1.5","v4.1.6","v4.1.7","v4.1.8","v4.1.9","v4.2.0-alpha.0","v4.2.0-beta.0","v4.2.0-beta.1","v4.2.0-beta.2","v4.2.0-beta.3","v4.2.0-beta.4","v4.2.2","v4.2.3","v4.3.0","v4.3.1","v4.3.2","v4.3.3","v4.3.4","v4.3.5","v4.3.6","v4.3.7","v4.3.8","v4.3.9","v4.4.0","v4.4.0-alpha.0","v4.4.1","v4.4.3","v4.4.4","v4.4.5","v4.4.6","v4.5.0","v4.5.1","v4.5.2","v4.5.3","v4.5.4","v4.5.5","v4.5.6"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-22893.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}