Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25537: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in Keats jsonwebtoken

0
Medium
VulnerabilityCVE-2026-25537cvecve-2026-25537cwe-843
Published: Wed Feb 04 2026 (02/04/2026, 21:31:53 UTC)
Source: CVE Database V5
Vendor/Project: Keats
Product: jsonwebtoken

Description

CVE-2026-25537 is a medium severity type confusion vulnerability in the Rust jsonwebtoken library versions prior to 10. 3. 0. The flaw arises from improper handling of standard JWT claims like 'nbf' or 'exp' when they are provided with incorrect JSON types, causing the library to treat malformed claims as if they were absent. This leads to bypassing critical time-based validations such as 'Not Before' checks, potentially allowing attackers to circumvent authentication and authorization controls. The vulnerability does not require authentication or user interaction and can be exploited remotely. It has been patched in version 10. 3. 0. European organizations using affected versions of jsonwebtoken in their Rust applications, especially those relying on JWT for security, are at risk.

AI-Powered Analysis

AILast updated: 02/04/2026, 22:00:24 UTC

Technical Analysis

The vulnerability identified as CVE-2026-25537 affects the jsonwebtoken library in Rust, specifically versions before 10.3.0. Jsonwebtoken is widely used for creating and validating JSON Web Tokens (JWTs), which are essential for authentication and authorization in modern applications. The issue is a type confusion vulnerability (CWE-843) in the claim validation logic. When a standard claim such as 'nbf' (Not Before) or 'exp' (Expiration Time) is provided with an incorrect JSON type—for example, a string instead of a numeric timestamp—the library's internal parser flags the claim as 'FailedToParse'. However, the validation logic treats this failure state the same as if the claim were not present at all. If the validation is enabled (e.g., validate_nbf = true) but the claim is not explicitly required in the 'required_spec_claims' configuration, the library skips the validation check for that claim. This behavior allows attackers to craft JWTs with malformed claims that bypass critical time-based security checks, potentially enabling unauthorized access or privilege escalation. The vulnerability can be exploited remotely without authentication or user interaction, increasing its risk profile. Although no known exploits are currently reported in the wild, the flaw's nature makes it a significant concern for applications relying on jsonwebtoken for security. The issue was addressed in version 10.3.0 by correcting the claim validation logic to properly handle malformed claims and enforce required claim checks.

Potential Impact

For European organizations, this vulnerability poses a risk to the integrity of authentication and authorization mechanisms in applications using the affected jsonwebtoken versions. Attackers could bypass time-based restrictions, such as 'Not Before' and 'Expiration' claims, allowing them to use tokens before their intended validity or after expiration. This could lead to unauthorized access to sensitive systems and data, undermining confidentiality and integrity. Industries with strict compliance requirements, such as finance, healthcare, and government sectors, could face regulatory repercussions if exploited. The vulnerability affects any Rust-based service or microservice relying on jsonwebtoken for JWT validation, which is increasingly common in modern cloud-native and distributed architectures. Given the medium CVSS score (5.5) and the lack of required authentication or user interaction, the threat is moderate but should not be underestimated, especially in environments where JWTs are critical for security. Failure to patch could also facilitate lateral movement within compromised networks. The absence of known exploits in the wild provides a window for proactive mitigation.

Mitigation Recommendations

1. Upgrade all instances of the jsonwebtoken Rust library to version 10.3.0 or later immediately to ensure the vulnerability is patched. 2. Review JWT validation configurations to explicitly mark critical claims such as 'nbf' and 'exp' as required in the 'required_spec_claims' setting to enforce strict validation. 3. Implement additional application-level checks on token validity periods as a defense-in-depth measure. 4. Conduct code audits and penetration testing focused on JWT handling to detect any misuse or bypass attempts. 5. Monitor logs for anomalous authentication patterns that could indicate exploitation attempts involving malformed JWT claims. 6. Educate development teams about secure JWT usage and the importance of keeping dependencies up to date. 7. For organizations using third-party services or libraries that depend on jsonwebtoken, verify their versions and coordinate updates accordingly. 8. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block JWTs with suspicious claim formats if feasible. 9. Maintain an inventory of applications using Rust jsonwebtoken to prioritize patching and monitoring efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T19:59:47.374Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6983bde5f9fa50a62fae8c94

Added to database: 2/4/2026, 9:45:09 PM

Last enriched: 2/4/2026, 10:00:24 PM

Last updated: 2/5/2026, 12:18:18 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats