Description
fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC.
Published: 2026-04-06
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Token Acceptance
Action: Apply Patch
AI Analysis

Impact

The vulnerability stems from fast-jwt’s failure to validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token includes a crit array listing extensions that the library does not understand, the implementation accepts the token instead of rejecting it. This behavior violates the mandatory requirement of the standard and allows a malicious actor to supply tokens with unknown or crafted extensions that may be interpreted incorrectly, potentially leading to authorization bypass or other unintended behavior. The weakness is consistent with CWE‑345 (Use of Externally‑Controlled Input to Select or Construct the Function or Path to Construct) and CWE‑636 (Conditional Logic Not Properly Guarded).

Affected Systems

Affected are installations of the fast-jwt library by nearform, specifically version 6.1.0 and all earlier releases. No patches are noted for later versions in the provided data, so the risk applies to all environments running those legacy releases.

Risk and Exploitability

The CVSS Base score of 7.5 signals a high severity, while the EPSS score of less than 1% indicates a low likelihood of current exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Attackers would deliver crafted JWTs—often embedded in HTTP requests—to trigger the library’s acceptance of critically malformed tokens. Since fast-jwt commonly processes tokens transmitted over the network, the attack can be performed remotely, albeit it requires the attacker to gain the ability to supply the token through the application’s input channel.

Generated by OpenCVE AI on April 10, 2026 at 19:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade fast-jwt to a version that validates the crit header parameter; the latest releases incorporate the required RFC check.
  • If an immediate upgrade is not feasible, modify the application to pre‑validate or reject any token that contains a crit header before it reaches fast-jwt.
  • Audit the application for any use of fast-jwt in untrusted contexts and apply stricter input validation.
  • Stay informed about vendor advisories and apply patches as soon as they are available.

Generated by OpenCVE AI on April 10, 2026 at 19:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hm7r-c7qw-ghp6 fast-jwt accepts unknown `crit` header extensions (RFC 7515 violation)
History

Fri, 10 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:nearform:fast-jwt:*:*:*:*:*:node.js:*:*

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Nearform
Nearform fast-jwt
Vendors & Products Nearform
Nearform fast-jwt

Mon, 06 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC.
Title fast-jwt accepts unknown `crit` header extensions (RFC 7515 §4.1.11 MUST violation)
Weaknesses CWE-345
CWE-636
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Nearform Fast-jwt
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T15:59:49.872Z

Reserved: 2026-03-31T21:06:06.428Z

Link: CVE-2026-35042

cve-icon Vulnrichment

Updated: 2026-04-07T15:19:44.996Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T17:17:13.410

Modified: 2026-04-10T18:35:35.117

Link: CVE-2026-35042

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:27:45Z

Weaknesses