We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30204

jwt-go allows excessive memory allocation during header parsing



Description

golang-jwt is a Go implementation of JSON Web Tokens. Starting in version 3.2.0 and prior to versions 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2.

Reserved 2025-03-18 | Published 2025-03-21 | Updated 2025-04-10 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-405: Asymmetric Resource Consumption (Amplification)

Product status

>= 3.2.0, < 4.5.2
affected

>= 5.0.0-rc.1, < 5.2.2
affected

References

github.com/...wt/jwt/security/advisories/GHSA-mh63-6h87-95cp

github.com/...ommit/0951d184286dece21f73c85673fd308786ffe9c3

github.com/...ommit/bf316c48137a1212f8d0af9288cc9ce8e59f1afb

cve.org (CVE-2025-30204)

nvd.nist.gov (CVE-2025-30204)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30204

Support options

Helpdesk Chat, Email, Knowledgebase