Description
Strapi uses JSON Web Tokens (JWT) for authentication. After logout or account deactivation, the JWT is not invalidated, which allows an attacker who has stolen or intercepted the token to freely reuse it until its expiration date (which is set to 30 days by default, but can be changed). The existence of /admin/renew-token endpoint allows anyone to renew near-expiration tokens indefinitely, further increasing the impact of this attack. This issue has been fixed in version 5.24.1.
INFO
Published Date :
2025-10-16T10:43:21.382Z
Last Modified :
2025-10-22T06:59:29.045Z
Source :
CERT-PL
AFFECTED PRODUCTS
The following products are affected by CVE-2025-3930 vulnerability.
| Vendors | Products |
|---|---|
| Strapi |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-3930.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability