Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-22706
Published:May 14, 2026
Updated:May 18, 2026
Strapi is an open source headless content management system. In Strapi versions prior to 5.33.3, changing or resetting a user's password did not invalidate the user's existing refresh-token sessions by default. The refresh-token invalidation step in the users-permissions and admin authentication controllers was conditional on a caller-supplied "deviceId". When a password change or reset request did not include a "deviceId", no refresh tokens were revoked, leaving every prior session active. An attacker who had previously obtained a refresh token could continue minting new access tokens after the legitimate user reset their password, allowing persistent unauthorized access for the lifetime of the refresh token (up to 30 days by default). Rotating credentials no longer terminated an active attacker session, defeating password reset as a containment measure. The patch in version 5.33.3 invalidates all refresh tokens associated with the user on every password change and password reset, regardless of whether a "deviceId" is supplied. A new device-scoped session is then issued to the caller as part of the response.
Affected Packages
@strapi/plugin-users-permissions (NPM):
Affected version(s) >=0.0.0-a3d182e0454ccff2702450b31621cd5026b389ca <5.33.3
Fix Suggestion:
Update to version 5.33.3
@strapi/admin (NPM):
Affected version(s) >=0.0.0-a3d182e0454ccff2702450b31621cd5026b389ca <5.33.3
Fix Suggestion:
Update to version 5.33.3
@strapi/plugin-users-permissions (NPM):
Affected version(s) >=0.0.0-0aec9b313e84cebcbd4d2cae07cdd3837003f20b <5.33.3
Fix Suggestion:
Update to version 5.33.3
@strapi/admin (NPM):
Affected version(s) >=0.0.0-0aec9b313e84cebcbd4d2cae07cdd3837003f20b <5.33.3
Fix Suggestion:
Update to version 5.33.3
Do you need more information?
Contact Us
CVSS v4
Base Score:
2.1
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
HIGH
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
2.2
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Insufficient Session Expiration
EPSS
Base Score:
0.03