fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC.
References
| Link | Resource |
|---|---|
| https://github.com/nearform/fast-jwt/security/advisories/GHSA-hm7r-c7qw-ghp6 | Exploit Mitigation Vendor Advisory |
| https://www.rfc-editor.org/rfc/rfc7515.html#section-4.1.11 | Technical Description |
| https://github.com/nearform/fast-jwt/security/advisories/GHSA-hm7r-c7qw-ghp6 | Exploit Mitigation Vendor Advisory |
Configurations
History
10 Apr 2026, 18:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/nearform/fast-jwt/security/advisories/GHSA-hm7r-c7qw-ghp6 - Exploit, Mitigation, Vendor Advisory | |
| References | () https://www.rfc-editor.org/rfc/rfc7515.html#section-4.1.11 - Technical Description | |
| CPE | cpe:2.3:a:nearform:fast-jwt:*:*:*:*:*:node.js:*:* | |
| First Time |
Nearform fast-jwt
Nearform |
07 Apr 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/nearform/fast-jwt/security/advisories/GHSA-hm7r-c7qw-ghp6 - |
06 Apr 2026, 17:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-06 17:17
Updated : 2026-04-10 18:35
NVD link : CVE-2026-35042
Mitre link : CVE-2026-35042
CVE.ORG link : CVE-2026-35042
JSON object : View
Products Affected
nearform
- fast-jwt
