Insufficient verification of data authenticity in jwcrypto - CVE-2022-3102
Published: September 19, 2022 / Updated: April 8, 2026
jwcrypto
latchset
Description
The vulnerability allows a remote attacker to bypass authentication or authorization.
The vulnerability exists due to improper token type handling in the JWT validation logic when processing a substituted token. A remote attacker can supply a crafted JWE in place of an expected signed JWS to bypass authentication or authorization.
Exploitation requires that the validating application has access to the private key during token validation and accepts tokens without separating signing and decryption key usage.