Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56643: n/a

0
Critical
VulnerabilityCVE-2025-56643cvecve-2025-56643
Published: Tue Nov 18 2025 (11/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Requarks Wiki.js 2.5.307 does not properly revoke or invalidate active JWT tokens when a user logs out. As a result, previously issued tokens remain valid and can be reused to access the system, even after logout. This behavior affects session integrity and may allow unauthorized access if a token is compromised. The issue is present in the authentication resolver logic and affects both the GraphQL endpoint and the logout mechanism.

AI-Powered Analysis

AILast updated: 11/18/2025, 18:13:24 UTC

Technical Analysis

CVE-2025-56643 identifies a security vulnerability in Requarks Wiki.js version 2.5.307 related to improper session management of JSON Web Tokens (JWT). When a user logs out, the system fails to revoke or invalidate the active JWT tokens, allowing these tokens to remain valid and reusable. This flaw is rooted in the authentication resolver logic, which governs token validation for both the GraphQL API endpoint and the logout process. Because JWTs are bearer tokens, possession of a valid token grants access to the system without requiring re-authentication. Consequently, if an attacker obtains a token—through interception, theft, or other means—they can continue to access the Wiki.js system even after the legitimate user has logged out. This undermines session integrity and confidentiality, potentially exposing sensitive documentation or internal knowledge bases. The vulnerability does not require user interaction beyond token theft and does not currently have known exploits in the wild. No CVSS score has been assigned, and no official patches or mitigations have been published as of the date. This issue highlights the importance of proper token lifecycle management, including token revocation or short expiration times, especially for systems relying on JWT for authentication.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for those using Wiki.js to manage sensitive internal documentation, intellectual property, or regulated data such as GDPR-protected personal information. Unauthorized reuse of JWT tokens can lead to unauthorized access to confidential information, data leakage, and potential compliance violations. The persistence of valid tokens after logout increases the risk of session hijacking and lateral movement within an organization's network. This can undermine trust in internal knowledge management systems and may facilitate further attacks if attackers leverage the access gained through compromised tokens. Organizations in sectors such as finance, healthcare, government, and technology, where Wiki.js might be deployed, face elevated risks. The absence of known exploits suggests a window of opportunity for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement the following specific measures: 1) Upgrade Wiki.js to a version where this vulnerability is patched once available; monitor vendor advisories closely. 2) If an immediate patch is unavailable, consider disabling JWT-based authentication or restricting access to trusted networks only. 3) Implement server-side token revocation mechanisms, such as maintaining a token blacklist or using short-lived JWTs combined with refresh tokens that can be revoked. 4) Enhance monitoring and logging of authentication events, particularly token usage and logout actions, to detect suspicious reuse of tokens. 5) Educate users about the importance of secure token handling and encourage use of multi-factor authentication (MFA) where possible to reduce the impact of token compromise. 6) Conduct regular security assessments of Wiki.js deployments and integrate token management best practices into the organization's security policies. 7) Consider network segmentation and access controls to limit exposure of Wiki.js instances.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691cb50331331b1c393fbbe7

Added to database: 11/18/2025, 6:03:47 PM

Last enriched: 11/18/2025, 6:13:24 PM

Last updated: 11/22/2025, 5:58:51 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats