Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h395-gr6q-cpjc | jsonwebtoken has Type Confusion that leads to potential authorization bypass |
Wed, 11 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:keats:jsonwebtoken:*:*:*:*:*:rust:*:* | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Sat, 07 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 05 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Keats
Keats jsonwebtoken |
|
| Vendors & Products |
Keats
Keats jsonwebtoken |
Wed, 04 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | jsonwebtoken is a JWT lib in rust. Prior to version 10.3.0, there is a Type Confusion vulnerability in jsonwebtoken, specifically, in its claim validation logic. When a standard claim (such as nbf or exp) is provided with an incorrect JSON type (Like a String instead of a Number), the library’s internal parsing mechanism marks the claim as “FailedToParse”. Crucially, the validation logic treats this “FailedToParse” state identically to “NotPresent”. This means that if a check is enabled (like: validate_nbf = true), but the claim is not explicitly marked as required in required_spec_claims, the library will skip the validation check entirely for the malformed claim, treating it as if it were not there. This allows attackers to bypass critical time-based security restrictions (like “Not Before” checks) and commit potential authentication and authorization bypasses. This issue has been patched in version 10.3.0. | |
| Title | jsonwebtoken has Type Confusion that leads to potential authorization bypass | |
| Weaknesses | CWE-843 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-05T20:52:48.021Z
Reserved: 2026-02-02T19:59:47.374Z
Link: CVE-2026-25537
Updated: 2026-02-05T20:52:32.068Z
Status : Analyzed
Published: 2026-02-04T22:15:59.807
Modified: 2026-02-11T19:13:47.607
Link: CVE-2026-25537
OpenCVE Enrichment
Updated: 2026-04-17T23:15:30Z
Github GHSA