Description
Payload uses JSON Web Tokens (JWT) for authentication. After log out JWT is not invalidated, which allows an attacker who has stolen or intercepted token to freely reuse it until expiration date (which is by default set to 2 hours, but can be changed). This issue has been fixed in version 3.44.0 of Payload.
Problem types
CWE-613 Insufficient Session Expiration
Product status
Any version before 3.44.0
Credits
Arkadiusz Marta
References
cert.pl/en/posts/2025/08/CVE-2025-4643
payloadcms.com
github.com/payloadcms/payload