
Cloud Vulnerability DB
A community-led vulnerabilities database
An authentication bypass vulnerability allows any unauthenticated attacker to forge arbitrary JWT tokens by setting "alg": "none" in the token header. The library's verification functions immediately return true for such tokens without performing any cryptographic verification, enabling complete impersonation of any user and privilege escalation.
The vulnerability exists in Sources/JSONWebSignature/JWS+Verify.swift at lines 34-37:
public func verify<Key>(key: Key?) throws -> Bool {
guard SigningAlgorithm.none != protectedHeader.algorithm else {
return true // <-- Vulnerability: returns true without verification
}When the JWT header contains "alg": "none", the verify() method returns true immediately without:
This is an authentication bypass vulnerability. Who is impacted: Any application using jose-swift for JWT verification is vulnerable. An attacker can:
Reported by Louis Nyffenegger - https://pentesterlab.com/
Source: NVD
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."