WhisperX tag archive

#jwt

This page collects WhisperX intelligence signals tagged #jwt. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (20)

The Lab · 2026-03-25 14:27:32 · GitHub Issues

1. Critical Security Flaw: Admin JWT Token Stored in sessionStorage, Vulnerable to XSS Theft

A critical security vulnerability has been identified in a web application's admin panel, where the administrator's JSON Web Token (JWT) is stored insecurely within the browser's `sessionStorage`. This storage mechanism is accessible to any JavaScript executing on the same page, creating a direct pathway for an attacke...

The Lab · 2026-03-25 14:27:38 · GitHub Issues

2. Security Flaw: Hardcoded JWT Secrets in Backend Code Risk Full Authentication Compromise

A critical security vulnerability has been identified in a backend application's configuration, where hardcoded, easily guessable default values for JWT secrets create a severe exposure risk. The flaw, located in the `backend/src/config/index.js` file, allows the system to fall back to these insecure defaults if the pr...

The Lab · 2026-03-26 20:27:20 · GitHub Issues

3. Critical Security Flaw: JWT Tokens Stored in localStorage Expose Website to XSS Attacks

A high-severity security vulnerability has been identified in a website's authentication system, where sensitive JSON Web Tokens (JWT) are stored in the browser's `localStorage`. This implementation flaw creates a direct pathway for Cross-Site Scripting (XSS) attacks, allowing any malicious script injected into the pag...

The Lab · 2026-03-26 20:27:23 · GitHub Issues

4. Critical JWT Token Security Flaw Exposes Web Application to XSS and CSRF Attacks

A high-severity security vulnerability has been identified in a web application's authentication system, where improperly configured JWT tokens lack essential security flags, leaving them exposed to token theft and session hijacking. The flaw resides in the `auth.ts` file, where tokens are set in cookies without the `H...

The Lab · 2026-03-28 13:27:05 · GitHub Issues

5. Critical Security Flaw in Default Configuration: Empty JWT_SECRET Allows Token Forgery

A default configuration file in a software project contains a critical security vulnerability that could allow attackers to forge authentication tokens. The `.env.example` file, intended as a setup template, leaves the `JWT_SECRET` and `ENCRYPTION_KEY` fields empty. While the system is configured to halt startup if the...

The Lab · 2026-03-29 15:27:04 · GitHub Issues

6. SECURITY ALERT: Critical XSS Vulnerability in JWT Token Storage (SEC-03)

A critical security vulnerability (SEC-03) has been identified, exposing user accounts to complete takeover via cross-site scripting (XSS) attacks. The flaw resides in the current authentication system, which stores JWT tokens in the browser's `localStorage`. This method is fundamentally insecure, as any successful XSS...

The Lab · 2026-03-29 15:27:06 · GitHub Issues

7. 🚨 Critical Security Flaw: Hardcoded JWT Secret 'secret' Exposes API to Token Forgery

A critical security vulnerability has been identified in a production codebase, where hardcoded JWT secret fallbacks could allow attackers to forge authentication tokens. The flaw, designated SEC-01, is a P0-level issue requiring immediate remediation before any future deployment. The core problem resides in the config...

The Lab · 2026-03-29 16:27:01 · GitHub Issues

8. SECURITY: JWT Token Leak in All Authenticated Endpoints via URL Query Parameter Fallback

A critical security flaw in the `JWTAuth` middleware allows authentication tokens to be exposed via URL query parameters across all authenticated HTTP endpoints, not just the intended WebSocket connections. This design oversight means any request to a protected route can inadvertently leak sensitive JSON Web Tokens thr...

The Lab · 2026-03-31 01:27:06 · GitHub Issues

9. Security Flaw: Memoire App Stores JWT Tokens in localStorage, Enabling Silent Account Takeover via XSS

A critical security vulnerability in the Memoire application exposes user authentication tokens to theft, enabling complete account takeover. The flaw stems from storing sensitive JSON Web Tokens (JWT) in the browser's `localStorage`, a location accessible to any JavaScript code running on the page. This design choice ...

The Lab · 2026-04-03 19:27:02 · GitHub Issues

10. Audit Gap: Client-Side JWT Module 'create-a-jwt' Excluded from Security Review

A critical TypeScript module responsible for generating and displaying JSON Web Tokens (JWTs) was excluded from a recent security audit, creating a significant verification blind spot. The module, named 'create-a-jwt', powers the `/tokens` page but its source code was not part of the audit scope. This omission prevents...

The Lab · 2026-04-04 05:26:58 · GitHub Issues

11. GitHub Security Audit Reveals Critical Hardening Checklist: JWT, DPAPI, SQLi, and Privilege Escalation Vectors Under Scrutiny

A comprehensive security audit checklist has surfaced, outlining a rigorous hardening protocol for a software project. The review targets a wide spectrum of critical vulnerabilities, moving beyond basic checks to scrutinize deep architectural and credential management weaknesses. The focus is not on a single flaw but o...

The Lab · 2026-04-04 12:27:11 · GitHub Issues

12. PyJWT 2.9.0 库曝出高危漏洞 (CVE-2025-XXXXX),影响 Litellm 等 Python 项目

一个影响广泛使用的 Python JSON Web Token 库 PyJWT 版本 2.9.0 的高危安全漏洞已被发现。该漏洞的严重性评分为 7.5(高危),可能使依赖该库的应用程序面临安全风险。漏洞详情已通过自动化安全扫描在 GitHub 仓库 `snowdensb/litellm` 的依赖文件中被识别,具体路径指向了缓存的 PyJWT-2.9.0-py3-none-any.whl 文件。 该漏洞直接影响 Litellm 项目,其构建环境中的依赖文件 `requirements.txt` 引用了存在缺陷的库版本。扫描报告明确指出,易受攻击的库文件位于项目的 Python 虚拟环境路径下。这表明任何使用相同版本 PyJWT 作为...

The Lab · 2026-04-04 19:27:00 · GitHub Issues

13. Critical JWT Algorithm Confusion Exposed: Attackers Can Forge Admin Tokens by Switching RS256 to HS256

A critical security flaw allows attackers to forge valid administrative access tokens by exploiting a JWT algorithm confusion vulnerability. The server, which expects tokens signed with the RS256 algorithm, fails to enforce this, accepting tokens that declare the HS256 algorithm instead. This enables an attacker to sig...

The Lab · 2026-04-05 21:27:10 · GitHub Issues

14. ExtensionShield's Cloud Authentication at Risk: Unmaintained python-jose Library with Critical JWT Vulnerabilities

ExtensionShield's core cloud authentication mechanism is built on a known-vulnerable and unmaintained dependency, exposing the platform to potential identity forgery and complete authentication bypass. The project's `pyproject.toml` explicitly depends on `python-jose[cryptography]>=3.3.0`, a library with documented cri...

The Lab · 2026-04-07 13:27:17 · GitHub Issues

15. API Security Flaw: Client-Submitted Identity Parameter Bypasses JWT Authentication

A critical authentication vulnerability has been identified in two core API models, allowing attackers to potentially impersonate any user. The flaw stems from a dangerous design pattern where the API accepts both a cryptographically verified JWT token and a separate, client-submitted user ID parameter (`asf_uid`). Thi...

The Lab · 2026-04-07 22:27:18 · GitHub Issues

16. Critical Pac4j-JWT Flaw (CVE-2026-29000) Exposes Authentication Bypass Risk

A critical security vulnerability in the widely used pac4j-jwt library allows attackers to forge authentication tokens and bypass signature verification entirely. Designated CVE-2026-29000, the flaw resides in the JwtAuthenticator component when processing encrypted JWTs. An attacker in possession of the server's RSA p...

The Lab · 2026-04-07 22:27:19 · GitHub Issues

17. Nimbus JOSE+JWT Library Exposed to DoS via Deeply Nested JSON in JWT Claims (CVE-2025-53864)

A critical vulnerability in the widely used Connect2id Nimbus JOSE+JWT library exposes systems to denial-of-service attacks through a simple, maliciously crafted JWT. The flaw, tracked as CVE-2025-53864, resides in the library's failure to enforce depth limits on nested JSON objects within JWT claim sets. An attacker c...

The Lab · 2026-04-07 23:27:26 · GitHub Issues

18. Critical JWT Authentication Bypass Exposed: Signature Verification Missing in API Middleware

A critical security vulnerability has been exposed in a JWT authentication middleware, allowing attackers to bypass authentication entirely. The flaw resides in the `decodeToken` function within `packages/api/src/middleware/auth.middleware.ts`, which decodes and validates a JWT's payload but crucially fails to verify t...

The Lab · 2026-04-08 00:26:54 · GitHub Issues

19. Critical Security Flaw: Hardcoded JWT Key in Authentication Exposes Platform to Full Account Takeover

A critical security vulnerability has been patched after a hardcoded JWT signing key was discovered in the platform's source code. The flaw, classified as CWE-798 (Use of Hard-coded Credentials), carried a CVSS 3.1 score of 9.1, indicating a severe risk. If the static key had been compromised—through a source code leak...

The Lab · 2026-04-08 03:27:04 · GitHub Issues

20. Critical JWT Library Flaw: jose4j-0.7.6 Exposes Systems to High-Severity Vulnerabilities

A widely used Java library for JSON Web Token (JWT) security contains multiple critical vulnerabilities, with the most severe flaw scoring a 7.5 CVSS rating. The open-source library `jose4j-0.7.6.jar`, a core component for implementing JWT, JWS, JWE, and JWK specifications, has been flagged with four security issues. T...