


Perceptive Security
SOC/SIEM Consultancy

fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC…
Published:
5 April 2026 at 22:00:00
Alert date:
6 April 2026 at 18:04:04
Source:
nvd.nist.gov
Web Technologies, Supply Chain & Dependencies
The fast-jwt library version 6.1.0 and earlier contains a vulnerability where it fails to validate the 'crit' (Critical) Header Parameter as defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that the library doesn't understand, it incorrectly accepts the token instead of rejecting it. This behavior violates the MUST requirement specified in the RFC standard. The vulnerability affects JWT token validation security by allowing potentially malicious tokens with unknown critical extensions to be processed. This could lead to security bypasses in applications relying on proper JWT validation.
Technical details
Mitigation steps:
Affected products:
fast-jwt
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-35042
https://github.com/nearform/fast-jwt/security/advisories/GHSA-hm7r-c7qw-ghp6
https://www.rfc-editor.org/rfc/rfc7515.html#section-4.1.11
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
