View all vulnerabilities

CVE-2020-26160

Authorization bypass in github.com/dgrijalva/jwt-go

jwt-go allows attackers to bypass intended access restrictions in situations with `[]string{}` for `m["aud"]` (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to [golang-jwt](https://github.com/golang-jwt/jwt) at version 3.2.1

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
7.5
Score Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Versions
github.com/dgrijalva/jwt-go >= 0.0.0-20150717181359-44718f8a89b0; github.com/dgrijalva/jwt-go/v4 < 4.0.0-preview1
Severity
High
Ecosystem
GO
Publish Date
May 18, 2021
Modified Date
January 14, 2025