https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1d8ee2254950fd2231de2b05/src/main/groovy/net/gleske/jervis/tools/SecurityIO.groovy#L244-L249
The code doesn't validate that the JWT header specifies "alg":"RS256".
Depending on the broader system, this could allow JWT forgery.
Internally this severity is low since JWT is only intended to interface with GitHub. External users should consider severity moderate.
Jervis patch will explicitly verify the algorithm in the header matches expectations and further verify the JWT structure.
Upgrade to Jervis 2.2.
External users should consider using an alternate JWT library or upgrade.
{
"github_reviewed": true,
"github_reviewed_at": "2026-01-13T14:56:04Z",
"severity": "MODERATE",
"nvd_published_at": "2026-01-13T20:16:07Z",
"cwe_ids": [
"CWE-347"
]
}