CVE-2025-3930

MEDIUM

Strapi <5.24.1 - Auth Bypass

Title source: llm
STIX 2.1

Description

Strapi uses JSON Web Tokens (JWT) for authentication. After logout or account deactivation, the JWT is not invalidated, which allows an attacker who has stolen or intercepted the token to freely reuse it until its expiration date (which is set to 30 days by default, but can be changed). The existence of /admin/renew-token endpoint allows anyone to renew near-expiration tokens indefinitely, further increasing the impact of this attack. This issue has been fixed in version 5.24.1.

Scores

CVSS v4 6.3
EPSS 0.0008
EPSS Percentile 22.5%
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-613
Status published
Products (2)
Strapi/Strapi < 5.24.1
strapi/strapi 0 - 5.24.1npm
Published Oct 16, 2025
Tracked Since Feb 18, 2026