CVE-2025-45765
Linux Debian vulnerability analysis and mitigation

Overview

Ruby-JWT v3.0.0.beta1 was discovered to contain weak encryption related to HMAC and RSA key lengths in JSON Web Signature (JWS) implementation. The vulnerability, tracked as CVE-2025-45765, was identified in July 2025. However, this is a disputed vulnerability as the supplier maintains that key size enforcement is not handled by the library itself but rather by the underlying OpenSSL implementation in recent versions (Red Hat CVE, GitHub Issue).

Technical details

The vulnerability concerns the implementation of cryptographic key lengths in the Ruby-JWT library that reportedly do not meet recommended security standards according to RFC 7518, NIST SP800-117, and RFC 2437. The issue specifically relates to HMAC and RSA key lengths used in the JSON Web Signature (JWS) implementation. The library does not enforce key lengths for HMAC or RSA algorithms, except where required by RSA/PS (GitHub Gist, Red Hat CVE).

Impact

The potential impact of this vulnerability is related to inadequate encryption strength (CWE-326), which could theoretically lead to security vulnerabilities if implementers use insufficient key lengths. However, since the key size enforcement is handled by the underlying OpenSSL implementation in recent versions, the actual impact depends on how the library is used rather than a flaw in the library's code (Red Hat CVE).

Mitigation and workarounds

No specific mitigation is required from the library perspective as key size enforcement is handled by the underlying OpenSSL implementation in recent versions. Users should ensure they are using appropriate key lengths as recommended by security standards (RFC 7518, NIST SP800-117, RFC 2437) in their implementations (Red Hat CVE).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management