Improper Validation of Syntactic Correctness of Input in cx-dummy-package
CVE-2025-22868
- cx-dummy-package
- github.com/lestrrat-go/jwx
- github.com/lestrrat-go/jwx/v2
- github.com/lestrrat-go/jwx/v3
- golang/oauth2
- golang.org/x/oauth2
- gopkg.in/golang/oauth2.v0
- gopkg.in/lestrrat-go/jwx.v0
- gopkg.in/lestrrat-go/jwx.v2
Summary
An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing. This issue affects golang.org/x/oauth2 versions prior to 0.27.0 and github.com/lestrrat-go/jwx versions prior to 2.1.5 and 3.x prior to 3.0.0-alpha3.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- NONE
- HIGH
CWE-1286 - Improper Validation of Syntactic Correctness of Input
The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax.
Advisory Timeline
- Published