Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65945: CWE-347: Improper Verification of Cryptographic Signature in auth0 node-jws

0
High
VulnerabilityCVE-2025-65945cvecve-2025-65945cwe-347
Published: Thu Dec 04 2025 (12/04/2025, 18:45:37 UTC)
Source: CVE Database V5
Vendor/Project: auth0
Product: node-jws

Description

auth0/node-jws is a JSON Web Signature implementation for Node.js. In versions 3.2.2 and earlier and version 4.0.0, auth0/node-jws has an improper signature verification vulnerability when using the HS256 algorithm under specific conditions. Applications are affected when they use the jws.createVerify() function for HMAC algorithms and use user-provided data from the JSON Web Signature protected header or payload in HMAC secret lookup routines, which can allow attackers to bypass signature verification. This issue has been patched in versions 3.2.3 and 4.0.1.

AI-Powered Analysis

AILast updated: 12/11/2025, 22:06:56 UTC

Technical Analysis

CVE-2025-65945 is a vulnerability in the auth0/node-jws library, a widely used JSON Web Signature implementation for Node.js. The flaw exists in versions 3.2.2 and earlier, as well as versions 4.0.0 and 4.0.1, specifically when using the HS256 HMAC algorithm. The vulnerability arises because the jws.createVerify() function improperly verifies signatures if the application uses user-supplied data from the JWS header or payload to determine the HMAC secret key. This improper verification allows attackers to bypass signature validation, effectively forging tokens or tampering with signed data without detection. The vulnerability is classified under CWE-347 (Improper Verification of Cryptographic Signature). Exploitation requires no privileges or user interaction and can be performed remotely by crafting malicious tokens. The impact is primarily on integrity, as attackers can impersonate users or escalate privileges by forging JWTs. No known exploits are currently reported in the wild. The issue was addressed by the vendor in versions 3.2.3 and 4.0.1 by correcting the verification logic to prevent user input from influencing secret key selection during signature verification.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity of authentication and authorization mechanisms relying on JWTs signed with the vulnerable node-jws versions. Attackers could forge tokens to impersonate users, escalate privileges, or bypass access controls, potentially leading to unauthorized data access, fraudulent transactions, or disruption of services. Sectors such as finance, healthcare, government, and critical infrastructure that depend on secure token-based authentication are particularly vulnerable. The lack of required authentication or user interaction lowers the barrier for exploitation, increasing the threat surface. Although confidentiality and availability are not directly impacted, the integrity compromise can cascade into broader security breaches and compliance violations under GDPR and other regulations. Organizations using affected versions in production environments must prioritize remediation to prevent exploitation.

Mitigation Recommendations

1. Immediately upgrade all instances of auth0/node-jws to versions 3.2.3 or later, or 4.0.2 and above, where the vulnerability is patched. 2. Audit application code to ensure that secret keys used for HMAC verification are not derived from user-controlled data, especially from JWT headers or payloads. 3. Implement strict input validation and sanitization for any data involved in cryptographic operations. 4. Review and enhance logging and monitoring to detect anomalous JWT usage or authentication failures that could indicate exploitation attempts. 5. Conduct penetration testing focusing on JWT forgery and signature bypass scenarios. 6. Educate development teams about secure JWT handling practices, emphasizing the risks of using user input in cryptographic key material. 7. Consider adopting alternative, well-maintained JWT libraries with robust security track records if feasible. 8. Maintain an inventory of all applications and services using node-jws to ensure comprehensive patching and risk assessment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-18T16:14:56.691Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6931d8e6e9ea82452660f546

Added to database: 12/4/2025, 6:54:30 PM

Last enriched: 12/11/2025, 10:06:56 PM

Last updated: 1/19/2026, 6:20:46 AM

Views: 873

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats