Description

Strapi uses JSON Web Tokens (JWT) for authentication. After logout or account deactivation, the JWT is not invalidated, which allows an attacker who has stolen or intercepted the token to freely reuse it until its expiration date (which is set to 30 days by default, but can be changed). The existence of /admin/renew-token endpoint allows anyone to renew near-expiration tokens indefinitely, further increasing the impact of this attack. This issue has been fixed in version 5.24.1.

INFO

Published Date :

2025-10-16T10:43:21.382Z

Last Modified :

2025-10-22T06:59:29.045Z

Source :

CERT-PL
AFFECTED PRODUCTS

The following products are affected by CVE-2025-3930 vulnerability.

Vendors Products
Strapi
  • Strapi
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-3930.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability