Skip to main content

Improper Validation of Syntactic Correctness of Input

CVE-2025-22868

Severity High
Score 7.5/10

Summary

An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing. This issue affects golang.org/x/oauth2 versions prior to 0.27.0 and github.com/lestrrat-go/jwx versions prior to 2.1.5 and 3.x prior to 3.0.0-alpha3.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • NONE
  • HIGH

CWE-1286 - Improper Validation of Syntactic Correctness of Input

The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax.

Advisory Timeline

  • Published