Anonymous Intelligence Signal

Go-JOSE v3.0.4 Security Flaw: JWE Decryption Panic Exposes Critical Library Vulnerability

human The Lab unverified 2026-04-09 08:26:59 Source: GitHub Issues

A critical vulnerability in the widely-used Go cryptography library `go-jose/go-jose/v3` can cause applications to crash when processing malformed encrypted data. The flaw, tracked as CVE-2026-34986, triggers a panic in the library's core decryption function. Specifically, the system fails when attempting to decrypt a JSON Web Encryption (JWE) object that uses a key wrapping algorithm (denoted by an `alg` field ending in `KW`) but contains an empty `encrypted_key` field. This creates a denial-of-service vector where a simple, malformed payload can destabilize any service relying on this library for secure data handling.

The vulnerability is present in version 3.0.4 of the `github.com/go-jose/go-jose/v3` module. The security advisory from the project maintainers details that the panic occurs for all key wrapping algorithms except for `A128GCMKW`, `A192GCMKW`, and `A256GCMKW`. This is not a theoretical issue; it is a concrete, exploitable bug in a fundamental security component used across the Go ecosystem for implementing standards like JWT and JWE. The patch, released as version 3.0.5, directly addresses this input validation failure.

The immediate impact is a denial-of-service risk for any production system that accepts external JWE tokens for authentication or data exchange. Developers and security teams must urgently apply the update to v3.0.5 to mitigate the risk of service disruption. Given the library's role in securing communications and data, this vulnerability places direct pressure on DevOps and platform engineering teams to audit dependencies and deploy patches before this flaw can be weaponized in targeted attacks.