Nearform Fast-Jwt vulnerabilities

7 known vulnerabilities affecting nearform/fast-jwt.

Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH1MEDIUM5

Vulnerabilities

Page 1 of 1
CVE-2026-35040MEDIUMCVSS 5.3fixed in 6.2.12026-04-09
CVE-2026-35040 [MEDIUM] CWE-440 CVE-2026-35040: fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 6.2.1, using certain modifiers fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 6.2.1, using certain modifiers on RegExp objects in the allowedAud, allowedIss, allowedSub, allowedJti, or allowedNonce options in verify functions can cause certain unintended behaviours. This is because some modifiers are stateful and will cause failures in every second verificati
ghsanvdosv
CVE-2026-35041MEDIUMCVSS 4.2v>= 5.0.0, < 6.2.12026-04-09
CVE-2026-35041 [MEDIUM] CWE-1333 CVE-2026-35041: fast-jwt provides fast JSON Web Token (JWT) implementation. From 5.0.0 to 6.2.0, a denial-of-service fast-jwt provides fast JSON Web Token (JWT) implementation. From 5.0.0 to 6.2.0, a denial-of-service condition exists in fast-jwt when the allowedAud verification option is configured using a regular expression. Because the aud claim is attacker-controlled and the library evaluates it against the supplied RegExp, a crafted JWT can trigger catastrop
ghsanvdosv
CVE-2026-35039CRITICALCVSS 9.1v>= 0.0.1, < 6.2.02026-04-06
CVE-2026-35039 [CRITICAL] CWE-345 CVE-2026-35039: fast-jwt provides fast JSON Web Token (JWT) implementation. From 0.0.1 to before 6.2.0, setting up a fast-jwt provides fast JSON Web Token (JWT) implementation. From 0.0.1 to before 6.2.0, setting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. This could cause tokens to be mis-identified during the verification process leading to valid tokens returning claims from d
ghsanvdosv
CVE-2026-35042HIGHCVSS 7.5fixed in 6.2.0≤ 6.1.02026-04-06
CVE-2026-35042 [HIGH] CWE-345 CVE-2026-35042: fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirem
ghsanvdosv
CVE-2026-34950MEDIUMCVSS 5.9≥ 0, < 6.2.02026-04-02
CVE-2026-34950 [MEDIUM] CWE-20 fast-jwt: Incomplete fix for CVE-2023-48223: JWT Algorithm Confusion via Whitespace-Prefixed RSA Public Key fast-jwt: Incomplete fix for CVE-2023-48223: JWT Algorithm Confusion via Whitespace-Prefixed RSA Public Key ### Summary The fix for GHSA-c2ff-88x2-x9pg (CVE-2023-48223) is incomplete. The publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT algorithm c
ghsaosv
CVE-2025-30144MEDIUMCVSS 6.5fixed in 5.0.62025-03-19
CVE-2025-30144 [MEDIUM] CWE-290 CVE-2025-30144: fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 5.0.6, the fast-jwt library doe fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 5.0.6, the fast-jwt library does not properly validate the iss claim based on the RFC 7519. The iss (issuer) claim validation within the fast-jwt library permits an array of strings as a valid iss value. This design flaw enables a potential attack where a malicious actor crafts a J
ghsanvdosv
CVE-2023-48223MEDIUMCVSS 5.9fixed in 3.3.2≤ 6.1.02023-11-20
CVE-2023-48223 [MEDIUM] CWE-20 CVE-2023-48223: fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to version 3.3.2, the fast-jwt lib fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to version 3.3.2, the fast-jwt library does not properly prevent JWT algorithm confusion for all public key types. The 'publicKeyPemMatcher' in 'fast-jwt/src/crypto.js' does not properly match all common PEM formats for public keys. To exploit this vulnerability, an attacker needs to c
ghsanvdosv