An attacker submitting the JWT token can choose the used signing algorithm (CVE-2022-29217)
{ "section": "core" }
"https://advisories.mageia.org/MGASA-2022-0244.json"