Home

Description

Payload uses JSON Web Tokens (JWT) for authentication. After log out JWT is not invalidated, which allows an attacker who has stolen or intercepted token to freely reuse it until expiration date (which is by default set to 2 hours, but can be changed). This issue has been fixed in version 3.44.0 of Payload.

PUBLISHED Reserved 2025-05-13 | Published 2025-08-29 | Updated 2025-08-29 | Assigner CERT-PL




MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-613 Insufficient Session Expiration

Product status

Default status
unaffected

Any version before 3.44.0
affected

Credits

Arkadiusz Marta finder

References

cert.pl/en/posts/2025/08/CVE-2025-4643 third-party-advisory

payloadcms.com product

github.com/payloadcms/payload product

cve.org (CVE-2025-4643)

nvd.nist.gov (CVE-2025-4643)

Download JSON