Github.Com Golang-Jwt Jwt V4 vulnerabilities
2 known vulnerabilities affecting github.com/golang-jwt_jwt_v4.
Total CVEs
2
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1LOW1
Vulnerabilities
Page 1 of 1
CVE-2025-30204HIGH≥ 0, < 4.5.22025-03-21
CVE-2025-30204 [HIGH] CWE-405 jwt-go allows excessive memory allocation during header parsing
jwt-go allows excessive memory allocation during header parsing
### Summary
Function [`parse.ParseUnverified`](https://github.com/golang-jwt/jwt/blob/c035977d9e11c351f4c05dfeae193923cbab49ee/parser.go#L138-L139) currently splits (via a call to [strings.Split](https://pkg.go.dev/strings#Split)) its argument (which is untrusted data) on periods.
As a result, in the face of a malicious request whose _Au
ghsaosv
CVE-2024-51744LOW≥ 0, < 4.5.12024-11-04
CVE-2024-51744 [LOW] CWE-347 Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations
Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations
### Summary
Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` re
ghsaosv