CRITICALCVE-2026-44351CVSS 9.1

CVE-2026-44351: Authentication Bypass in fast-jwt

Plattform

nodejs

Komponente

fast-jwt

Behoben in

6.2.4

CVE-2026-44351 is a critical authentication bypass vulnerability discovered in fast-jwt, a popular JSON Web Token (JWT) implementation. This flaw allows unauthenticated attackers to forge valid JWTs, effectively bypassing authentication mechanisms. The vulnerability affects versions 1.0.0 up to 6.2.3, and a patch is available in version 6.2.4.

Auswirkungen und Angriffsszenarien

The impact of this vulnerability is severe. An attacker can exploit it to gain unauthorized access to systems and data protected by JWT authentication. By forging valid JWTs, they can impersonate legitimate users and perform actions as if they were authorized. This could lead to data breaches, privilege escalation, and complete compromise of the affected application. The ability to bypass authentication entirely represents a significant security risk, particularly in applications relying heavily on JWTs for access control. The zero-length buffer derivation for allowed algorithms is a particularly concerning aspect, as it allows attackers to bypass signature verification entirely.

Ausnutzungskontext

CVE-2026-44351 was published on May 13, 2026. The vulnerability's ease of exploitation, combined with the widespread use of JWTs, suggests a high probability of exploitation. While no public exploits have been widely reported, the potential for abuse is significant. The vulnerability is not currently listed on KEV or EPSS, but its severity warrants close monitoring. Refer to the official fast-jwt advisory for further details.

Bedrohungsanalyse

Exploit-Status

Proof of ConceptUnbekannt
CISA KEVNO
Internet-ExponierungHoch

CVSS-Vektor

BEDROHUNGSANALYSE· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N9.1CRITICALAttack VectorNetworkWie der Angreifer das Ziel erreichtAttack ComplexityLowBedingungen zur erfolgreichen AusnutzungPrivileges RequiredNoneErforderliche AuthentifizierungsstufeUser InteractionNoneOb ein Opfer eine Aktion ausführen mussScopeUnchangedAuswirkungen über die Komponente hinausConfidentialityHighRisiko der Offenlegung sensibler DatenIntegrityHighRisiko nicht autorisierter DatenänderungAvailabilityNoneRisiko der Dienstunterbrechungnextguardhq.com · CVSS v3.1 Basis-Score
Was bedeuten diese Metriken?
Attack Vector
Netzwerk — aus der Ferne über das Internet ausnutzbar. Kein physischer oder lokaler Zugriff erforderlich.
Attack Complexity
Niedrig — keine besonderen Bedingungen erforderlich. Zuverlässig ausnutzbar.
Privileges Required
Keine — ohne Authentifizierung ausnutzbar. Keine Zugangsdaten erforderlich.
User Interaction
Keine — automatischer und lautloser Angriff. Das Opfer tut nichts.
Scope
Unverändert — Auswirkung auf das anfällige Komponente beschränkt.
Confidentiality
Hoch — vollständiger Vertraulichkeitsverlust. Angreifer kann alle Daten lesen.
Integrity
Hoch — Angreifer kann beliebige Daten schreiben, ändern oder löschen.
Availability
Keine — kein Verfügbarkeitseinfluss.

Betroffene Software

Komponentefast-jwt
Herstellernearform
Mindestversion1.0.0
Höchstversion< 6.2.4
Behoben in6.2.4

Schwachstellen-Klassifikation (CWE)

Zeitleiste

  1. Reserviert
  2. Veröffentlicht

Mitigation und Workarounds

The primary mitigation is to immediately upgrade to fast-jwt version 6.2.4 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds. One approach is to ensure that your key resolver never returns an empty string. Strictly validate the output of your key resolver to prevent empty strings from being passed to fast-jwt. Additionally, consider implementing stricter JWT validation rules, such as verifying the issuer and audience claims, to limit the potential damage from forged tokens. After upgrading, confirm the fix by attempting to forge a JWT with a missing or invalid key identifier and verifying that it is rejected.

So behebenwird übersetzt…

Actualice a la versión 6.2.4 o superior de fast-jwt para mitigar la vulnerabilidad. Asegúrese de que el key resolver no devuelva una cadena vacía, ya que esto permite la falsificación de tokens JWT.

Häufig gestellte Fragen

What is CVE-2026-44351 — Authentication Bypass in fast-jwt?

CVE-2026-44351 is a critical vulnerability in fast-jwt allowing attackers to forge JWTs, bypassing authentication. It affects versions 1.0.0 through 6.2.3, enabling unauthorized access and potential data breaches.

Am I affected by CVE-2026-44351 in fast-jwt?

If your application uses fast-jwt versions 1.0.0 to 6.2.3 and your key resolver can return an empty string, you are likely affected. Check your version and key resolver implementation immediately.

How do I fix CVE-2026-44351 in fast-jwt?

Upgrade to fast-jwt version 6.2.4 or later. As a temporary workaround, ensure your key resolver never returns an empty string and implement stricter JWT validation rules.

Is CVE-2026-44351 being actively exploited?

While no widespread exploitation has been publicly reported, the vulnerability's severity and ease of exploitation suggest a high probability of future attacks. Monitor your systems closely.

Where can I find the official fast-jwt advisory for CVE-2026-44351?

Refer to the official fast-jwt repository and associated security advisories for the most up-to-date information and guidance: [https://github.com/formic/fast-jwt](https://github.com/formic/fast-jwt)

Ist dein Projekt betroffen?

Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.

liveKostenloser Scan

Jetzt testen — kein Konto

Laden Sie ein Manifest hoch (composer.lock, package-lock.json, WordPress Plugin-Liste…) oder fügen Sie Ihre Komponentenliste ein. Sie erhalten sofort einen Schwachstellenbericht. Das Hochladen einer Datei ist nur der Anfang: Mit einem Konto erhalten Sie kontinuierliche Überwachung, Slack/email-Benachrichtigungen, Multi-Projekt- und White-Label-Berichte.

Manueller ScanSlack/E-Mail-AlertsKontinuierliche ÜberwachungWhite-Label-Berichte

Abhängigkeitsdatei hier ablegen

composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...