Insufficient Session Expiration in strapi - CVE-2026-22706
Published: May 13, 2026
strapi
Detailed vulnerability description
The vulnerability allows a remote user to maintain unauthorized access after a password reset.
The vulnerability exists due to improper session expiration in the users-permissions and admin authentication controllers when handling password change or reset requests without a deviceId. A remote privileged user can use a previously obtained refresh token to maintain unauthorized access after a password reset.
Existing refresh-token sessions remain active if the password change or reset request does not include a deviceId.