CVE-2026-35039

fast-jwt provides fast JSON Web Token (JWT) implementation. From 0.0.1 to before 6.2.0, setting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. This could cause tokens to be mis-identified during the verification process leading to valid tokens returning claims from different valid tokens and users being mis-identified as other users based on the wrong token. Version 6.2.0 contains a patch.
Configurations

No configuration.

History

08 Apr 2026, 12:16

Type Values Removed Values Added
References
  • () https://github.com/nearform/fast-jwt/commit/de121056c6415b58770c60640881eaec67ac4cebĀ -
Summary (en) fast-jwt provides fast JSON Web Token (JWT) implementation. From 0.0.1 to before 6.1.0, setting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. This could cause tokens to be mis-identified during the verification process leading to valid tokens returning claims from different valid tokens and users being mis-identified as other users based on the wrong token. (en) fast-jwt provides fast JSON Web Token (JWT) implementation. From 0.0.1 to before 6.2.0, setting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. This could cause tokens to be mis-identified during the verification process leading to valid tokens returning claims from different valid tokens and users being mis-identified as other users based on the wrong token. Version 6.2.0 contains a patch.

06 Apr 2026, 17:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-06 17:17

Updated : 2026-04-08 12:16


NVD link : CVE-2026-35039

Mitre link : CVE-2026-35039

CVE.ORG link : CVE-2026-35039


JSON object : View

Products Affected

No product.

CWE
CWE-345

Insufficient Verification of Data Authenticity

CWE-706

Use of Incorrectly-Resolved Name or Reference

CWE-1289

Improper Validation of Unsafe Equivalence in Input