Skip to content

[VULN] Security Alert for jsonwebtoken #217

@srm-local-dev-test

Description

@srm-local-dev-test

Alert IDs:

  • 3aa06237-0e7b-4e20-a400-ae8e0e2b0a1c

Vulnerabilities in jsonwebtoken

Release: 1.0.125

Total Vulnerabilities: 1


1. CVE-2026-25537

Severity: HIGH (Score: 7.5)

Description:
jsonwebtoken is a JWT lib in rust. Prior to version 10.3.0, there is a Type Confusion vulnerability in jsonwebtoken, specifically, in its claim validation logic. When a standard claim (such as nbf or exp) is provided with an incorrect JSON type (Like a String instead of a Number), the library’s internal parsing mechanism marks the claim as “FailedToParse”. Crucially, the validation logic treats this “FailedToParse” state identically to “NotPresent”. This means that if a check is enabled (like: validate_nbf = true), but the claim is not explicitly marked as required in required_spec_claims, the library will skip the validation check entirely for the malformed claim, treating it as if it were not there. This allows attackers to bypass critical time-based security restrictions (like “Not Before” checks) and commit potential authentication and authorization bypasses. This issue has been patched in version 10.3.0.

Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-25537

Alert ID: 3aa06237-0e7b-4e20-a400-ae8e0e2b0a1c


Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions