CVE-2025-22149: JWK Set's HTTP client only overwrites and appends JWK to local cache during refresh
2.1
CVSS Score
4.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.35228%
CWE
Published
1/9/2025
Updated
1/9/2025
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/MicahParks/jwkset | go | >= 0.5.0, <= 0.5.21 | 0.6.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the HTTP client's cache refresh mechanism in NewStorageFromHTTP. In vulnerable versions (<=0.5.21), the refresh handler processed remote JWK Sets without first clearing existing keys (no KeyDeleteAll call). The commit diff shows the fix added store.KeyDeleteAll() before processing new keys, confirming the previous absence of cache clearance was the root cause. The function manages the auto-caching behavior described in the vulnerability reports, making it the primary point of failure.