JWT Invalidation Issue in Strapi by Strapi
CVE-2025-3930
6.3MEDIUM
What is CVE-2025-3930?
Strapi's implementation of JSON Web Tokens (JWT) presents a significant security issue where tokens remain valid even after a user logs out or deactivates their account. This allows malicious actors to exploit stolen or intercepted tokens until they expire, which by default lasts for 30 days. Furthermore, the presence of the /admin/renew-token endpoint enables unauthorized renewal of tokens nearing expiration, compounding the risk by granting attackers extended access. The issue has been rectified in Strapi version 5.24.1.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Strapi 0 < 5.24.1
References
CVSS V4
Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Arkadiusz Marta
