← Back to CVEs
CVE-2025-3930
N/ADescription
Strapi uses JSON Web Tokens (JWT) for authentication. After logout or account deactivation, the JWT is not invalidated, which allows an attacker who has stolen or intercepted the token to freely reuse it until its expiration date (which is set to 30 days by default, but can be changed). The existence of /admin/renew-token endpoint allows anyone to renew near-expiration tokens indefinitely, further increasing the impact of this attack. This issue has been fixed in version 5.24.1.
CVE Details
CVSS v3.1 ScoreN/A
Published10/16/2025
Last Modified10/22/2025
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-613
References
https://cert.pl/en/posts/2025/06/CVE-2025-3930(cvd@cert.pl)
https://github.com/strapi/strapi(cvd@cert.pl)
https://strapi.io/(cvd@cert.pl)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.