CVE-2024-51744
Docker vulnerability analysis and mitigation

Overview

golang-jwt is a Go implementation of JSON Web Tokens. A vulnerability was discovered in versions <= 4.5.0 where unclear documentation of the error behavior in ParseWithClaims can lead to improper error checking. The issue was disclosed on November 4, 2024 and has been assigned CVE-2024-51744 (GitHub Advisory).

Technical details

The vulnerability stems from how the ParseWithClaims function handles multiple error conditions. When a token is both expired and has an invalid signature, the function returns both error codes. If developers only check for jwt.ErrTokenExpired using error.Is, they will miss the embedded jwt.ErrTokenSignatureInvalid, potentially accepting invalid tokens. The vulnerability has been assigned a CVSS v3.1 base score of 3.1 (Low) with vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N (GitHub Advisory).

Impact

If exploited, this vulnerability could lead to acceptance of invalid tokens in applications that don't properly check for all error conditions. This could potentially allow attackers to bypass token validation mechanisms, though the actual impact depends on how the application implements token verification (GitHub Advisory).

Mitigation and workarounds

The issue has been patched in version 4.5.1 by backporting error handling logic from the v5 branch. The fix makes ParseWithClaims immediately return in 'dangerous' situations like invalid signatures. For users unable to upgrade, the workaround is to properly check for all errors, with 'dangerous' ones checked first. The recommended error checking sequence is: token validity, malformed token, unverifiable token, invalid signature, and finally expiration/activation time (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Docker vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61729HIGH7.5
  • cAdvisorcAdvisor
  • influx
NoYesDec 02, 2025
CVE-2025-67499MEDIUM6.6
  • DockerDocker
  • containerd-fips
NoYesDec 10, 2025
CVE-2025-61727MEDIUM6.5
  • cAdvisorcAdvisor
  • podman-catatonit
NoYesDec 03, 2025
CVE-2025-58181MEDIUM5.3
  • cAdvisorcAdvisor
  • grype
NoYesNov 19, 2025
CVE-2025-47914MEDIUM5.3
  • cAdvisorcAdvisor
  • grype-db
NoYesNov 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management