Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33204: CWE-400: Uncontrolled Resource Consumption in kelvinmo simplejwt

0
High
VulnerabilityCVE-2026-33204cvecve-2026-33204cwe-400
Published: Fri Mar 20 2026 (03/20/2026, 22:37:13 UTC)
Source: CVE Database V5
Vendor/Project: kelvinmo
Product: simplejwt

Description

SimpleJWT is a simple JSON web token library written in PHP. Prior to version 1.1.1, an unauthenticated attacker can perform a Denial of Service via JWE header tampering when PBES2 algorithms are used. Applications that call JWE::decrypt() on attacker-controlled JWEs using PBES2 algorithms are affected. This issue has been patched in version 1.1.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 23:44:44 UTC

Technical Analysis

CVE-2026-33204 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in the simplejwt PHP library developed by kelvinmo. The flaw exists in versions prior to 1.1.1 and specifically affects the handling of JSON Web Encryption (JWE) tokens when PBES2 (Password-Based Encryption Scheme 2) algorithms are used. An attacker can craft malicious JWE tokens with tampered headers that, when passed to the JWE::decrypt() function, cause excessive resource consumption on the server. This can lead to Denial of Service (DoS) by exhausting CPU or memory resources, thereby impacting the availability of applications relying on this library. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The root cause is insufficient validation or controls on the input JWE header fields when PBES2 algorithms are processed, allowing attackers to trigger expensive cryptographic operations repeatedly. The issue was publicly disclosed and patched in version 1.1.1 of simplejwt. No known exploits are currently reported in the wild, but the ease of exploitation and high impact on availability warrant immediate attention. This vulnerability is particularly critical for web applications that rely on simplejwt for token encryption and decryption, especially those exposed to untrusted inputs or internet-facing endpoints.

Potential Impact

The primary impact of CVE-2026-33204 is a Denial of Service condition caused by uncontrolled resource consumption during the decryption of maliciously crafted JWEs using PBES2 algorithms. This can lead to server instability, degraded performance, or complete service outages, affecting the availability of affected applications. Organizations using vulnerable versions of simplejwt in their PHP environments risk disruption of critical services, potentially affecting user experience and business operations. Although confidentiality and integrity are not compromised, the availability impact can be severe, especially for high-traffic web services or APIs relying on JWT-based authentication or encryption. The vulnerability's ease of exploitation without authentication increases the risk of widespread attacks, including automated scanning and exploitation attempts. This can also lead to cascading effects if the affected services are part of larger distributed systems or microservices architectures. The lack of known exploits in the wild suggests the vulnerability is newly disclosed, but proactive mitigation is essential to prevent future attacks.

Mitigation Recommendations

1. Upgrade simplejwt to version 1.1.1 or later immediately to apply the official patch that addresses this vulnerability. 2. If upgrading is not immediately possible, implement input validation and filtering to restrict or sanitize JWE tokens, especially those using PBES2 algorithms, before passing them to the JWE::decrypt() function. 3. Employ rate limiting and anomaly detection on endpoints that accept JWTs to detect and block suspicious or excessive decryption requests. 4. Monitor application logs for unusual patterns of JWE decryption failures or resource spikes indicative of exploitation attempts. 5. Consider isolating or sandboxing the decryption process to limit resource consumption impact on the main application. 6. Review and harden cryptographic configurations to avoid using PBES2 algorithms if not strictly necessary, or replace them with more secure and efficient alternatives. 7. Educate development teams about secure handling of JWTs and the risks of processing untrusted tokens without proper validation. 8. Conduct penetration testing and vulnerability scanning focusing on JWT handling to identify similar weaknesses in custom implementations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T23:23:58.312Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdda59b462d409683a8ccd

Added to database: 3/20/2026, 11:38:01 PM

Last enriched: 3/20/2026, 11:44:44 PM

Last updated: 3/21/2026, 12:01:38 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses