CVE-2025-59685
Description
Kazaar 1.25.12 allows a JWT with none in the alg field.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Kazaar 1.25.12 fails to verify JWT signatures, accepting tokens with 'none' algorithm, enabling authentication bypass.
Vulnerability
Kazaar versions 1.25.12 and below accept JSON Web Tokens (JWT) with the algorithm field set to 'none' [2]. This violates the JWT specification, which requires that the 'none' algorithm only be used with transport layer security. The application does not properly verify the token signature, allowing an attacker to forge valid tokens.
Exploitation
An attacker with a valid JWT from any user account can decode the token, change the algorithm to 'none', and modify the payload as desired [2]. The modified token will be accepted by the server for any endpoint, bypassing authentication entirely. No prior network position is required beyond normal HTTP access to the application.
Impact
Successful exploitation grants the attacker unauthorized access to all endpoints with the privileges of the impersonated user. This could lead to data exposure, manipulation, and privilege escalation depending on the user role.
Mitigation
The issue is patched in Kazaar version 1.25.12? Actually the advisory says versions below 1.25.12 are affected. The fix likely requires strict validation of the JWT algorithm. Users should upgrade to the latest version. [2]
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.