Insufficient Session Expiration Affecting @strapi/plugin-users-permissions package, versions <5.33.3


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insufficient Session Expiration vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-STRAPIPLUGINUSERSPERMISSIONS-16682291
  • published14 May 2026
  • disclosed13 May 2026
  • creditIsaac David, Arthur Gervais, Hồ Việt Anh, bugbunny.ai, Aastha2602

Introduced: 13 May 2026

NewCVE-2026-22706  (opens in a new tab)
CWE-613  (opens in a new tab)

How to fix?

Upgrade @strapi/plugin-users-permissions to version 5.33.3 or higher.

Overview

@strapi/plugin-users-permissions is a headless CMS

Affected versions of this package are vulnerable to Insufficient Session Expiration in the password reset or change operation. An attacker can maintain unauthorized access by continuing to use a previously obtained refresh token to generate new access tokens, even after the legitimate user resets their password.

Note: This is only exploitable if a password reset or change occurs without supplying a deviceId parameter.

CVSS Base Scores

version 4.0
version 3.1