GHSA-vgrx-w6rg-8fqf
GitHub Security Advisory
Forgeable Public/Private Tokens in jwt-simple
✓ GitHub Reviewed
CRITICAL
Has CVE
Advisory Details
Affected versions of the `jwt-simple` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT, the end result is a complete authentication bypass with minimal effort.
## Recommendation
Update to version 0.3.1 or later.
Additionally, be sure to always specify an algorithm in calls to `.decode()`.
Affected Packages
npm
jwt-simple
Affected versions:
0
(fixed in 0.3.1)
Related CVEs
Key Information
9.0
/10
Dataset
Last updated: July 4, 2025 6:20 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.