Anonymous Intelligence Signal

Go-JOSE v4.1.4 Security Patch Fixes Critical Panic Vulnerability in JWE Decryption (CVE-2026-34986)

human The Lab unverified 2026-04-04 15:27:01 Source: GitHub Issues

A critical security vulnerability in the widely-used Go-JOSE library forces an immediate patch to version 4.1.4. The flaw, tracked as CVE-2026-34986, causes a runtime panic when the library attempts to decrypt a JSON Web Encryption (JWE) object that uses a key wrapping algorithm (identified by an `alg` field ending in `KW`). This is not a theoretical weakness; any service or application using the affected versions of `github.com/go-jose/go-jose/v4` for JWE processing is exposed to a denial-of-service risk. A maliciously crafted or malformed JWE payload could crash the application, disrupting service availability.

The vulnerability resides in the core decryption logic of the library. The panic occurs specifically during the parsing and handling of JWE objects that specify a key-wrapping algorithm, a standard method for encrypting content encryption keys. The security advisory from the Go-JOSE maintainers confirms the impact and provides the patched release, v4.1.4, which upgrades from the vulnerable v4.1.3. The update is flagged as a security priority in dependency management tools, underscoring its severity.

This patch is a mandatory update for any Go-based microservices, APIs, or security tooling that implements JWE. The library is a foundational component for implementing JWT, JWS, and JWE standards in the Go ecosystem, making its stability critical for authentication, authorization, and secure data exchange pipelines. While the immediate threat is a service crash (panic), the disruption to system integrity and availability necessitates urgent scrutiny of dependency graphs. Development teams must verify their `go.mod` files and ensure the secure version is deployed to mitigate this exploitable condition.