CVE-2026-33204: CWE-400: Uncontrolled Resource Consumption in kelvinmo simplejwt
SimpleJWT is a simple JSON web token library written in PHP. Prior to version 1.1.1, an unauthenticated attacker can perform a Denial of Service via JWE header tampering when PBES2 algorithms are used. Applications that call JWE::decrypt() on attacker-controlled JWEs using PBES2 algorithms are affected. This issue has been patched in version 1.1.1.
AI Analysis
Technical Summary
CVE-2026-33204 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in the simplejwt PHP library developed by kelvinmo. The flaw exists in versions prior to 1.1.1 and specifically affects the decryption process of JSON Web Encryption (JWE) tokens when PBES2 (Password-Based Encryption Scheme 2) algorithms are employed. An attacker can craft malicious JWE tokens with tampered headers that, when processed by the vulnerable JWE::decrypt() function, cause excessive resource consumption such as CPU or memory exhaustion. This leads to a Denial of Service (DoS) condition, rendering the application or service unavailable. The attack vector requires no authentication or user interaction, and can be executed remotely by sending specially crafted tokens to the affected application. The vulnerability does not impact confidentiality or integrity of data but solely availability. The issue was identified and patched in version 1.1.1 of simplejwt. No known exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 7.5, reflecting high severity due to ease of exploitation and significant impact on availability. This vulnerability is critical for applications that rely on simplejwt for JWT handling, especially those exposed to untrusted inputs or public-facing APIs that decrypt JWE tokens using PBES2 algorithms.
Potential Impact
The primary impact of CVE-2026-33204 is Denial of Service, which can disrupt the availability of web applications or services using vulnerable versions of simplejwt for JWT decryption with PBES2 algorithms. Organizations relying on this library may experience service outages or degraded performance, potentially affecting user experience and business operations. Since the attack requires no authentication and can be triggered remotely, it poses a significant risk to internet-facing applications. While confidentiality and integrity are not compromised, the loss of availability can lead to operational downtime, loss of customer trust, and potential financial losses. In environments where JWTs are critical for authentication or session management, disruption can cascade to broader system impacts. The absence of known exploits in the wild suggests limited current exploitation, but the vulnerability’s high severity and ease of exploitation warrant urgent remediation. Organizations with automated systems or APIs processing JWTs are particularly vulnerable to resource exhaustion attacks leveraging this flaw.
Mitigation Recommendations
To mitigate CVE-2026-33204, organizations should immediately upgrade the simplejwt library to version 1.1.1 or later, where the vulnerability has been patched. Additionally, implement strict input validation and filtering on JWT tokens received from untrusted sources to detect and reject malformed or suspicious JWE headers. Employ rate limiting and anomaly detection on endpoints that process JWTs to prevent abuse through repeated malicious requests. Consider deploying Web Application Firewalls (WAFs) with custom rules to block known attack patterns targeting JWT decryption. Monitor application logs for unusual spikes in resource usage or errors related to JWT processing. For critical systems, isolate JWT processing components and apply resource usage quotas to limit the impact of potential resource exhaustion. Regularly review and update dependencies to incorporate security patches promptly. Finally, educate development teams about secure JWT handling practices and the risks of processing attacker-controlled tokens without validation.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, India, Netherlands, Brazil, Japan
CVE-2026-33204: CWE-400: Uncontrolled Resource Consumption in kelvinmo simplejwt
Description
SimpleJWT is a simple JSON web token library written in PHP. Prior to version 1.1.1, an unauthenticated attacker can perform a Denial of Service via JWE header tampering when PBES2 algorithms are used. Applications that call JWE::decrypt() on attacker-controlled JWEs using PBES2 algorithms are affected. This issue has been patched in version 1.1.1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33204 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in the simplejwt PHP library developed by kelvinmo. The flaw exists in versions prior to 1.1.1 and specifically affects the decryption process of JSON Web Encryption (JWE) tokens when PBES2 (Password-Based Encryption Scheme 2) algorithms are employed. An attacker can craft malicious JWE tokens with tampered headers that, when processed by the vulnerable JWE::decrypt() function, cause excessive resource consumption such as CPU or memory exhaustion. This leads to a Denial of Service (DoS) condition, rendering the application or service unavailable. The attack vector requires no authentication or user interaction, and can be executed remotely by sending specially crafted tokens to the affected application. The vulnerability does not impact confidentiality or integrity of data but solely availability. The issue was identified and patched in version 1.1.1 of simplejwt. No known exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 7.5, reflecting high severity due to ease of exploitation and significant impact on availability. This vulnerability is critical for applications that rely on simplejwt for JWT handling, especially those exposed to untrusted inputs or public-facing APIs that decrypt JWE tokens using PBES2 algorithms.
Potential Impact
The primary impact of CVE-2026-33204 is Denial of Service, which can disrupt the availability of web applications or services using vulnerable versions of simplejwt for JWT decryption with PBES2 algorithms. Organizations relying on this library may experience service outages or degraded performance, potentially affecting user experience and business operations. Since the attack requires no authentication and can be triggered remotely, it poses a significant risk to internet-facing applications. While confidentiality and integrity are not compromised, the loss of availability can lead to operational downtime, loss of customer trust, and potential financial losses. In environments where JWTs are critical for authentication or session management, disruption can cascade to broader system impacts. The absence of known exploits in the wild suggests limited current exploitation, but the vulnerability’s high severity and ease of exploitation warrant urgent remediation. Organizations with automated systems or APIs processing JWTs are particularly vulnerable to resource exhaustion attacks leveraging this flaw.
Mitigation Recommendations
To mitigate CVE-2026-33204, organizations should immediately upgrade the simplejwt library to version 1.1.1 or later, where the vulnerability has been patched. Additionally, implement strict input validation and filtering on JWT tokens received from untrusted sources to detect and reject malformed or suspicious JWE headers. Employ rate limiting and anomaly detection on endpoints that process JWTs to prevent abuse through repeated malicious requests. Consider deploying Web Application Firewalls (WAFs) with custom rules to block known attack patterns targeting JWT decryption. Monitor application logs for unusual spikes in resource usage or errors related to JWT processing. For critical systems, isolate JWT processing components and apply resource usage quotas to limit the impact of potential resource exhaustion. Regularly review and update dependencies to incorporate security patches promptly. Finally, educate development teams about secure JWT handling practices and the risks of processing attacker-controlled tokens without validation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T23:23:58.312Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bdda59b462d409683a8ccd
Added to database: 3/20/2026, 11:38:01 PM
Last enriched: 3/28/2026, 9:17:21 PM
Last updated: 5/4/2026, 6:08:22 PM
Views: 95
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.