Skip to main content

Authentication Bypass by Spoofing

CVE-2025-30144

Severity Medium
Score 6.5/10

Summary

The fast-jwt package provides a fast JSON Web Token (JWT) implementation. The fast-jwt library did not properly validate the iss claim according to RFC 7519. The iss (issuer) claim validation within the fast-jwt library allowed an array of strings to be a valid iss value. This design flaw enabled a potential attack where a malicious actor could craft a JWT with an iss claim structured as ['https://attacker-domain/', 'https://valid-iss']. Due to the permissive validation, the JWT would be deemed valid. Furthermore, if the application relied on external libraries like get-jwks that did not independently validate the iss claim, the attacker could exploit this vulnerability to forge a JWT that would be accepted by the victim application. Essentially, the attacker could insert their own domain into the iss array alongside the legitimate issuer, bypassing the intended security checks. This issue affects versions prior to 5.0.6.

  • HIGH
  • NETWORK
  • HIGH
  • UNCHANGED
  • NONE
  • NONE
  • LOW
  • NONE

CWE-290 - Authentication Bypass by Spoofing

This attack-focused weakness is caused by improperly implemented authentication schemes that are subject to spoofing attacks.

Advisory Timeline

  • Published