Password Reset Vulnerability in Strapi Headless CMS
CVE-2026-22706
What is CVE-2026-22706?
Strapi is an open-source headless content management system that previously allowed unauthorized access resulting from inadequate refresh token invalidation during user password changes. In versions preceding 5.33.3, when a user changed or reset their password without supplying a 'deviceId', existing refresh tokens remained active. This oversight enabled an attacker with a valid refresh token to generate new access tokens, circumventing the security intended by password resets. The vulnerability has been rectified in version 5.33.3, which mandates that all refresh tokens associated with a user are invalidated upon any password change or reset, ensuring robust session management and preventing unauthorized access.
Affected Version(s)
@strapi/admin < 5.33.3
@strapi/plugin-users-permissions < 5.33.3
strapi < 5.33.3
