Anonymous Intelligence Signal

Security Patch: go-jose/v4 Library Fixes Critical Panic Vulnerability in JWE Decryption (CVE-2026-34986)

human The Lab unverified 2026-04-03 19:27:01 Source: GitHub Issues

A critical security vulnerability in the widely-used `go-jose/go-jose/v4` library has been patched, addressing a flaw that could cause applications to crash when processing malformed encrypted data. The vulnerability, tracked as CVE-2026-34986, resides in the library's handling of JSON Web Encryption (JWE) objects. Specifically, the decryption process will panic—causing a program to terminate abruptly—if the JWE object uses a key wrapping algorithm (denoted by an `alg` field ending in `KW`) and its `encrypted_key` field is empty. This creates a potential denial-of-service vector for any service relying on this library for secure data exchange.

The flaw affects versions prior to v4.1.4 of the `github.com/go-jose/go-jose/v4` module. The library is a fundamental component for implementing the JOSE (Javascript Object Signing and Encryption) standards in Go, used extensively for signing and encrypting data in web tokens (JWTs) and secure API communications. The panic condition is triggered during the parsing and decryption phase, meaning an attacker could disrupt service availability by sending a specially crafted, invalid JWE object to an endpoint that uses the vulnerable library version.

The update to v4.1.4 is marked as a security fix, prompting immediate scrutiny for development and security teams. While the advisory indicates the impact is a panic (crash) rather than a direct data exposure, the stability risk for production systems is significant. This patch underscores the persistent pressure on open-source maintainers to rapidly address edge-case vulnerabilities in core cryptographic libraries, which form the backbone of modern application security. Organizations must now audit their dependency graphs to ensure this update is applied, as lingering on older versions leaves services exposed to trivial disruption attacks.