CVE-2022-36083
JavaScript vulnerability analysis and mitigation

Overview

CVE-2022-36083 affects JOSE (JSON Web Almost Everything), a library providing cryptographic operations for JWA, JWS, JWE, JWT, JWK, and JWKS in Node.js, Browser, Cloudflare Workers, Electron, and Deno environments. The vulnerability was discovered and disclosed on September 7, 2022. The issue specifically relates to the PBKDF2-based JWE key management algorithms and their handling of the p2c (PBES2 Count) JOSE Header Parameter (NVD).

Technical details

The vulnerability centers on the PBKDF2-based JWE key management algorithms which use a JOSE Header Parameter named p2c (PBES2 Count) to determine the number of PBKDF2 iterations for deriving a CEK wrapping key. While this parameter is intended to slow down key derivation to prevent brute-force attacks, it can be exploited when JWE is received from untrusted sources. The vulnerability has a CVSS v3.1 score of 5.3 (Medium) (GHSA).

Impact

When exploited, this vulnerability can cause the user's environment to consume an unreasonable amount of CPU time. The impact is specifically limited to users utilizing JWE decryption APIs with symmetric secrets to decrypt JWEs from untrusted parties who do not limit the accepted JWE Key Management Algorithms using the keyManagementAlgorithms decryption option (GHSA).

Mitigation and workarounds

The vulnerability has been patched in versions v1.28.2, v2.0.6, v3.20.4, and v4.9.2, which limit the maximum PBKDF2 iteration count to 10,000 by default. Users can adjust this limit using the newly introduced maxPBES2Count decryption option. For those unable to upgrade, alternative mitigations include using the keyManagementAlgorithms decryption option to disable accepting PBKDF2 altogether or inspecting the JOSE Header prior to using the decryption API to limit the PBKDF2 iteration count (GHSA).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66456CRITICAL9.1
  • JavaScriptJavaScript
  • elysia
NoYesDec 09, 2025
CVE-2025-66457HIGH7.5
  • JavaScriptJavaScript
  • elysia
NoYesDec 09, 2025
CVE-2025-65849MEDIUM6.9
  • JavaScriptJavaScript
  • altcha
NoNoDec 08, 2025
CVE-2025-66202MEDIUM6.5
  • JavaScriptJavaScript
  • astro
NoYesDec 09, 2025
CVE-2025-66479LOW1.8
  • JavaScriptJavaScript
  • @anthropic-ai/sandbox-runtime
NoYesDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management