
Cloud Vulnerability DB
A community-led vulnerabilities database
jsonwebtoken is an implementation of JSON Web Tokens where versions <= 8.5.1 contained a vulnerability that could be misconfigured when passing a poorly implemented key retrieval function. The vulnerability (CVE-2022-23541) was discovered and disclosed in December 2022, affecting the jsonwebtoken library's token verification process. The issue allows tokens signed with an asymmetric public key to be verified with a symmetric HS256 algorithm, potentially leading to successful validation of forged tokens (GitHub Advisory).
The vulnerability stems from incorrect verification of tokens when using different algorithm and key combinations. Specifically, the issue occurs when an application supports both symmetric and asymmetric key usage in jwt.verify() implementation with the same key retrieval function. The vulnerability has a CVSS v3.1 Base Score of 5.0 MEDIUM (Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L) as reported by GitHub (NVD).
The successful exploitation of this vulnerability could lead to the validation of forged tokens, potentially compromising authentication and authorization mechanisms. This could allow attackers to bypass security controls by using incorrectly verified tokens (GitHub Advisory).
The vulnerability has been patched in version 9.0.0 of the jsonwebtoken library. Users are strongly advised to update to this version to address the security issue. The fix includes improvements to key validation and algorithm verification processes (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."