CVE-2025-22149

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-22149
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-22149.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-22149
Aliases
Related
Published
2025-01-09T18:15:30Z
Modified
2025-01-15T05:17:21.927970Z
Summary
[none]
Details

JWK Set (JSON Web Key Set) is a JWK and JWK Set Go implementation. Prior to 0.6.0, the project's provided HTTP client's local JWK Set cache should do a full replacement when the goroutine refreshes the remote JWK Set. The current behavior is to overwrite or append. This is a security issue for use cases that utilize the provided auto-caching HTTP client and where key removal from a JWK Set is equivalent to revocation. The affected auto-caching HTTP client was added in version v0.5.0 and fixed in v0.6.0. The only workaround would be to remove the provided auto-caching HTTP client and replace it with a custom implementation. This involves setting the HTTPClientStorageOptions.RefreshInterval to zero (or not specifying the value).

References

Affected packages

Git / github.com/micahparks/jwkset

Affected ranges

Type
GIT
Repo
https://github.com/micahparks/jwkset
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0
v0.1.1
v0.1.2
v0.2.0
v0.2.1
v0.2.2
v0.2.3
v0.3.0
v0.3.1
v0.4.0
v0.5.0
v0.5.1
v0.5.10
v0.5.11
v0.5.12
v0.5.13
v0.5.14
v0.5.15
v0.5.16
v0.5.17
v0.5.18
v0.5.19
v0.5.2
v0.5.20
v0.5.21
v0.5.3
v0.5.4
v0.5.5
v0.5.6
v0.5.7
v0.5.8
v0.5.9