Skip to main content

Improper Validation of Syntactic Correctness of Input in cx-dummy-package

CVE-2025-22868

  • cx-dummy-package
  • github.com/lestrrat-go/jwx
  • github.com/lestrrat-go/jwx/v2
  • github.com/lestrrat-go/jwx/v3
  • golang/oauth2
  • golang.org/x/oauth2
  • gopkg.in/golang/oauth2.v0
  • gopkg.in/lestrrat-go/jwx.v0
  • gopkg.in/lestrrat-go/jwx.v2
Severity High
Score 7.5/10

Summary

An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing. This issue affects golang.org/x/oauth2 versions prior to 0.27.0 and github.com/lestrrat-go/jwx versions prior to 2.1.5 and 3.x prior to 3.0.0-alpha3.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • NONE
  • HIGH

CWE-1286 - Improper Validation of Syntactic Correctness of Input

The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax.

Advisory Timeline

  • Published