CVE-2026-34950

fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, the publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT algorithm confusion attack that CVE-2023-48223 patched.
Configurations

No configuration.

History

06 Apr 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-06 16:16

Updated : 2026-04-07 13:20


NVD link : CVE-2026-34950

Mitre link : CVE-2026-34950

CVE.ORG link : CVE-2026-34950


JSON object : View

Products Affected

No product.

CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm