nuts-node has JWT type confusion in v1 access token introspection that allows VP replay as access token
Description
Summary
The v1 access token introspection endpoint (/auth/v1/introspect_access_token) accepts any JWT signed by a key present on the node, without validating the JWT type, issuer-to-key binding, or required claims. This allows a Verifiable Presentation (VP) JWT to be replayed as an access token and receive an active: true introspection response.
Background
In the v1 auth flow (Nuts RFC003), access tokens are JWTs signed by the authorizer's key with: - iss = authorizer organization DID - sub = requester organization DID - service = purpose of use (e.g. "eOverdracht") - typ header = "JWT" (default, not explicitly set)
Verifiable Presentations are also JWTs with typ: "JWT" (per W3C VC Data Model 1.1). The W3C VC Data Model 2.0 changed this to vp+jwt specifically to prevent this class of confusion attack (See Securing Verifiable Credentials using JOSE and COSE 3.1.1).
Vulnerability details
The introspection endpoint performs only standard JWT checks. It does not perform the following Nuts-specific access token checks:
- **Validate the
typheader**: both ATs and VPs use"JWT" - **Bind
issto the signing key**: it doesn't verify that theissclaim matches the DID extracted from thekid - Validate required claims:
servicecan be empty;vpclaim is silently ignored byFromMap()which uses lenient JSON unmarshaling
Attack scenario
Prerequisites: Attacker (Org B) has received a VP JWT from the victim (Org A) during a normal access token request flow.
- Org A creates a VP JWT signed with Org A's key and sends it to Org B (normal protocol flow) to request an access token
- Org B presents this VP JWT to Org A's resource server as a bearer access token
- Resource server calls Org A's v1 introspection endpoint
- Introspection checks
privateKeyStore.Exists(kid), which passes, because Org A's key is on Org A's node - JSON unmarshaling is lenient; the
vpclaim is silently ignored - Returns
active: truewithservice: "",iss: "",sub:
Mitigating factors
- **
serviceis empty**: resource servers that strictly require a non-emptyservicefield may reject the request at the application level - **
issis empty**: VP JWTs don't setiss, so resource servers checking this field would see an empty value - Short-lived VPs: VPs typically expire within minutes, narrowing the attack window
- v1 is legacy: the v2 flow uses opaque access tokens and is not affected
Severity rationale
While the introspection endpoint incorrectly returns active: true for a replayed VP, we consider this not practically exploitable in the current deployment landscape. Resource servers require valid service, iss and aud values to route requests to the correct databases. A replayed VP returns empty service, empty iss, and wrong sub (Org A instead of B), making it unusable for meaningful access. The attack also requires the victim to first present a VP to the attacker through a legitimate protocol flow, and VPs are short-lived.
The severity reflects that the protection against exploitation is accidental (resource servers need service for routing, not for security) and we cannot guarantee how all resource server implementations handle the active: true response with missing fields.
The fix
Affected versions: all v5.x releases prior to v5.4.31, and all v6.x releases prior to v6.2.3. From v5.4.31 and v6.2.3 onward, the following checks have been added to IntrospectAccessToken:
- **
iss-to-kidbinding**: extract the DID from thekidheader and verify it matches theissclaim - Required claims validation: reject tokens where
serviceis empty - **
typheader validation**: requires access tokens to be oftyp: "at+jwt"
Additionally, the access token creation code has been updated to use typ: "at+jwt" per RFC 9068.
Patch
Patches are available at https://github.com/nuts-foundation/nuts-node/releases/tag/v5.4.31 and https://github.com/nuts-foundation/nuts-node/releases/tag/v6.2.3.
Workaround
If users are unable to update their nuts-node, resource servers can mitigate this risk by explicitly validating the introspection response: reject responses where service is empty, where iss is empty or does not match the expected authorizer DID, or where sub does not match the expected requester DID (Org B instead of A).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
JWT type confusion in Nuts v1 introspection endpoint allows replay of Verifiable Presentation as access token, bypassing resource authorization.
Vulnerability
The v1 access token introspection endpoint (/auth/v1/introspect_access_token) accepts any JWT signed by a key present on the node without validating the JWT type, issuer-to-key binding, or required claims. Both access tokens and Verifiable Presentations (VPs) use the typ: "JWT" header, enabling this confusion attack [1].
Exploitation
An attacker who receives a VP JWT from a victim during a normal access token request flow can present that VP as a bearer token to the victim's resource server. The introspection endpoint checks only that the signing key exists (via kid) and performs lenient JSON unmarshaling, ignoring the vp claim. It returns active: true with empty or default claims [1].
Impact
This can give the attacker unauthorized access to resources that trust the introspection response. While the resulting service field is empty, resource servers that do not strictly validate this field may grant access. The attack requires the victim to have previously signed a VP during a legitimate interaction [1].
Mitigation
Patches have been released in versions 6.2.3 [2] and 5.4.31 [3]. These updates add validation of the typ header, issuer-to-key binding, and required claims to prevent VP replay.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/nuts-foundation/nuts-nodeGo | <= 1.1.0 | — |
Affected products
1- Range: <= 1.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.