Vulnerabilities/

Payload does not invalidate JWTs after log out (GHSA-5v66-m237-hwf7)

Severity:
Medium

Description

Payload uses JSON Web Tokens (JWT) for authentication. After log out JWT is not invalidated, which allows an attacker who has stolen or intercepted token to freely reuse it until expiration date (which is by default set to 2 hours, but can be changed).

This issue has been fixed in version 3.44.0 of Payload.

Recommendation

Update the @payloadcms/next package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
@payloadcms/next
Anything's wrong? Let us know Last updated on August 29, 2025

This issue is available in SmartScanner Professional

See Pricing