CVE-2025-30144

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-30144
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-30144.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-30144
Aliases
Published
2025-03-19T16:15:33Z
Modified
2025-03-20T01:55:48.842325Z
Summary
[none]
Details

fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 5.0.6, the fast-jwt library does not properly validate the iss claim based on the RFC 7519. The iss (issuer) claim validation within the fast-jwt library permits an array of strings as a valid iss value. This design flaw enables a potential attack where a malicious actor crafts a JWT with an iss claim structured as ['https://attacker-domain/', 'https://valid-iss']. Due to the permissive validation, the JWT will be deemed valid. Furthermore, if the application relies on external libraries like get-jwks that do not independently validate the iss claim, the attacker can leverage this vulnerability to forge a JWT that will be accepted by the victim application. Essentially, the attacker can insert their own domain into the iss array, alongside the legitimate issuer, and bypass the intended security checks. This issue is fixed in 5.0.6.

References

Affected packages

Git / github.com/nearform/fast-jwt

Affected ranges

Type
GIT
Repo
https://github.com/nearform/fast-jwt
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0
v0.1.1
v0.2.0
v0.3.0
v0.3.1
v0.4.0
v0.4.1
v0.4.2
v0.5.0
v0.5.1

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.1.2
v1.1.3
v1.2.0
v1.3.0
v1.3.2
v1.4.0
v1.4.1
v1.5.0
v1.5.1
v1.5.2
v1.5.3
v1.5.4
v1.6.0
v1.6.1
v1.7.0
v1.7.1
v1.7.2

v2.*

v2.0.0