Логотип exploitDog
bind:CVE-2025-3930
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-3930

Количество 2

Количество 2

nvd логотип

CVE-2025-3930

4 месяца назад

Strapi uses JSON Web Tokens (JWT) for authentication. After logout or account deactivation, the JWT is not invalidated, which allows an attacker who has stolen or intercepted the token to freely reuse it until its expiration date (which is set to 30 days by default, but can be changed). The existence of /admin/renew-token endpoint allows anyone to renew near-expiration tokens indefinitely, further increasing the impact of this attack. This issue has been fixed in version 5.24.1.

EPSS: Низкий
github логотип

GHSA-4r8w-3jww-m2rp

4 месяца назад

Strapi is vulnerable to Insufficient Session Expiration

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-3930

Strapi uses JSON Web Tokens (JWT) for authentication. After logout or account deactivation, the JWT is not invalidated, which allows an attacker who has stolen or intercepted the token to freely reuse it until its expiration date (which is set to 30 days by default, but can be changed). The existence of /admin/renew-token endpoint allows anyone to renew near-expiration tokens indefinitely, further increasing the impact of this attack. This issue has been fixed in version 5.24.1.

0%
Низкий
4 месяца назад
github логотип
GHSA-4r8w-3jww-m2rp

Strapi is vulnerable to Insufficient Session Expiration

0%
Низкий
4 месяца назад

Уязвимостей на страницу