VYPR

npm package

fast-jwt

pkg:npm/fast-jwt

Vulnerabilities (8)

  • CVE-2026-44351CriMay 13, 2026
    affected < 6.2.4fixed 6.2.4

    fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 6.2.4, a critical authentication-bypass vulnerability in fast-jwt's async key-resolver flow allows any unauthenticated attacker to forge arbitrary JWTs that are accepted as authentic. When the application's key

  • CVE-2026-35041MedApr 9, 2026
    affected >= 5.0.0, < 6.2.1fixed 6.2.1

    fast-jwt provides fast JSON Web Token (JWT) implementation. From 5.0.0 to 6.2.0, a denial-of-service condition exists in fast-jwt when the allowedAud verification option is configured using a regular expression. Because the aud claim is attacker-controlled and the library evaluat

  • CVE-2026-35040MedApr 9, 2026
    affected < 6.2.1fixed 6.2.1

    fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 6.2.1, using certain modifiers on RegExp objects in the allowedAud, allowedIss, allowedSub, allowedJti, or allowedNonce options in verify functions can cause certain unintended behaviours. This is because some m

  • CVE-2026-35042HigApr 6, 2026
    affected <= 6.1.0

    fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt does not understand, the library

  • CVE-2026-35039CriApr 6, 2026
    affected >= 0.0.1, < 6.2.0fixed 6.2.0

    fast-jwt provides fast JSON Web Token (JWT) implementation. From 0.0.1 to before 6.2.0, setting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. This could cause tokens to be mis-identified during the

  • CVE-2026-34950CriApr 6, 2026
    affected < 6.2.0fixed 6.2.0

    fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, the publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT algorithm confusion attack that C

  • CVE-2025-30144MedMar 19, 2025
    affected < 5.0.6fixed 5.0.6

    fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 5.0.6, the fast-jwt library does not properly validate the iss claim based on the RFC 7519. The iss (issuer) claim validation within the fast-jwt library permits an array of strings as a valid iss value. This de

  • CVE-2023-48223Nov 20, 2023
    affected < 3.3.2fixed 3.3.2

    fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to version 3.3.2, the fast-jwt library does not properly prevent JWT algorithm confusion for all public key types. The 'publicKeyPemMatcher' in 'fast-jwt/src/crypto.js' does not properly match all common PEM format