fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, the publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT algorithm confusion attack that CVE-2023-48223 patched.
| Vendor | Product | Versions |
|---|---|---|
| nearform | fast-jwt | <= 6.1.0 |
Updated description with new details about the vulnerability and corrected exploit availability.
Initial creation