Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libjwt
Libjwt libjwt |
|
| CPEs | cpe:2.3:a:libjwt:libjwt:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Libjwt
Libjwt libjwt |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 31 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Benmcollins
Benmcollins libjwt |
|
| Vendors & Products |
Benmcollins
Benmcollins libjwt |
Sun, 29 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Sat, 28 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LibJWT is a C JSON Web Token Library. Starting in version 3.0.0 and prior to version 3.3.0, the JWK parsing for RSA-PSS did not protect against a NULL value when expecting to parse JSON string values. A specially crafted JWK file could exploit this behavior by using integers in places where the code expected a string. This was fixed in v3.3.0. A workaround is available. Users importing keys through a JWK file should not do so from untrusted sources. Use the `jwk2key` tool to check for validity of a JWK file. Likewise, if possible, do not use JWK files with RSA-PSS keys. | |
| Title | LibJWT has NULL/bounds validation in JWK octet and RSA PSS parsing | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-31T18:53:51.741Z
Reserved: 2026-03-24T22:20:06.214Z
Link: CVE-2026-33996
Updated: 2026-03-31T18:50:39.588Z
Status : Analyzed
Published: 2026-03-27T23:17:14.590
Modified: 2026-03-31T20:39:06.073
Link: CVE-2026-33996
OpenCVE Enrichment
Updated: 2026-04-02T07:55:12Z