An attacker submitting the JWT token can choose the used signing algorithm (CVE-2022-29217)
{ "section": "core" }