Improper Validation of Syntactic Correctness of Input
CVE-2025-22868
Summary
An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing. This issue affects golang.org/x/oauth2 versions prior to 0.27.0 and github.com/lestrrat-go/jwx versions prior to 2.1.5 and 3.x prior to 3.0.0-alpha3.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- NONE
- HIGH
CWE-1286 - Improper Validation of Syntactic Correctness of Input
The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax.
Advisory Timeline
- Published