-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| jsonwebtoken | npm | < 9.0.0 | 9.0.0 |
The vulnerability stems from the jwt.verify() function's handling of algorithm validation. The commit diff shows security fixes in verify.js that add asymmetric key validation and remove default 'none' algorithm support. The CHANGELOG explicitly states the verify() function previously accepted unsigned tokens by default. The CVE description confirms the attack scenario requires jwt.verify() to be called without algorithm specification and with falsy secret/key - conditions directly tied to this function's implementation. The added validateAsymmetricKey checks in the patched version further confirm the vulnerability existed in the verification flow.
Ongoing coverage of React2Shell