Insufficient Session Expiration in strapi - CVE-2026-22706

 

Insufficient Session Expiration in strapi - CVE-2026-22706

Published: May 13, 2026


Vulnerability identifier: #VU131369
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-22706
CWE-ID: CWE-613
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: strapi.io
Affected software:
strapi

Detailed vulnerability description

The vulnerability allows a remote user to maintain unauthorized access after a password reset.

The vulnerability exists due to improper session expiration in the users-permissions and admin authentication controllers when handling password change or reset requests without a deviceId. A remote privileged user can use a previously obtained refresh token to maintain unauthorized access after a password reset.

Existing refresh-token sessions remain active if the password change or reset request does not include a deviceId.


How to mitigate CVE-2026-22706

Install security update from vendor's website.

Sources