top of page
perceptive_background_267k.jpg

fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC…

Published:

5 april 2026 om 22:00:00

Alert date:

6 april 2026 om 18:04:04

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Supply Chain & Dependencies

The fast-jwt library version 6.1.0 and earlier contains a vulnerability where it fails to validate the 'crit' (Critical) Header Parameter as defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that the library doesn't understand, it incorrectly accepts the token instead of rejecting it. This behavior violates the MUST requirement specified in the RFC standard. The vulnerability affects JWT token validation security by allowing potentially malicious tokens with unknown critical extensions to be processed. This could lead to security bypasses in applications relying on proper JWT validation.

Technical details

Mitigation steps:

Affected products:

fast-jwt

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page