Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-22706— Strapi: Password Reset Does Not Revoke Existing Refresh Sessions

AI Predicted 7.5 Difficulty: Easy EPSS 0.03% · P9

Possible ATT&CK Techniques 1AI

T1078 · Valid Accounts

Affected Version Matrix 3

VendorProductVersion RangeStatus
strapi@strapi/admin< 5.33.3affected
strapi@strapi/plugin-users-permissions< 5.33.3affected
strapistrapi< 5.33.3affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-22706

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Strapi: Password Reset Does Not Revoke Existing Refresh Sessions
Source: NVD (National Vulnerability Database)
Vulnerability Description
Strapi is an open source headless content management system. In Strapi versions prior to 5.33.3, changing or resetting a user's password did not invalidate the user's existing refresh-token sessions by default. The refresh-token invalidation step in the users-permissions and admin authentication controllers was conditional on a caller-supplied `deviceId`. When a password change or reset request did not include a `deviceId`, no refresh tokens were revoked, leaving every prior session active. An attacker who had previously obtained a refresh token could continue minting new access tokens after the legitimate user reset their password, allowing persistent unauthorized access for the lifetime of the refresh token (up to 30 days by default). Rotating credentials no longer terminated an active attacker session, defeating password reset as a containment measure. The patch in version 5.33.3 invalidates all refresh tokens associated with the user on every password change and password reset, regardless of whether a `deviceId` is supplied. A new device-scoped session is then issued to the caller as part of the response.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
不充分的会话过期机制
Source: NVD (National Vulnerability Database)
Vulnerability Title
Strapi 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Strapi是法国strapi社区的一套开源的内容管理系统(CMS)。 Strapi 5.33.3之前版本存在代码问题漏洞,该漏洞源于更改或重置用户密码时未默认使现有刷新令牌会话失效,可能导致先前获取刷新令牌的攻击者在合法用户重置密码后继续生成新的访问令牌,实现持久未授权访问。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
strapistrapi < 5.33.3 -
strapi@strapi/admin < 5.33.3 -
strapi@strapi/plugin-users-permissions < 5.33.3 -

II. Public POCs for CVE-2026-22706

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-22706

登录查看更多情报信息。

Same Patch Batch · strapi · 2026-05-14 · 5 CVEs total

CVE-2026-22707Strapi Upload Plugin MIME Validation Bypass via Content API
CVE-2026-22599Strapi Vulnerable to SQL Injection in Content Type Builder
CVE-2026-27886Strapi may leak sensitive data via relational filtering due to lack of query sanitization
CVE-2025-64526Strapi has a rate limit bypass on users-permissions plugin via attacker-controlled email k

IV. Related Vulnerabilities

V. Comments for CVE-2026-22706

No comments yet


Leave a comment