Impact
SimpleJWT, a PHP library for JSON web tokens, allows an attacker to trigger a denial of service by tampering with the JWE header when PBES2 algorithms are used. The flaw lies in the JWE::decrypt() routine, which does not validate the header properly and can be invoked with attacker‑controlled tokens. Because the attack does not require authentication, it compromises availability for any application relying on this library.
Affected Systems
The vulnerability affects the SimpleJWT library from Kelvinmo, in all releases before version 1.1.1. Production systems using unsaved or externally supplied JWE tokens with PBES2 algorithms will be impacted.
Risk and Exploitability
With a CVSS score of 7.5 and an EPSS score below 1%, the risk is high but the likelihood of exploitation is currently low, as the vulnerability is not listed in CISA KEV. An attacker only needs to supply a crafted JWE header to an application that calls JWE::decrypt(), making exploitation straightforward once the input is under their control.
OpenCVE Enrichment
Github GHSA