Vulnerability Details CVE-2020-26160
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 13.6%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2020-26160
-
cpe:2.3:a:jwt-go_project:jwt-go:-
-
cpe:2.3:a:jwt-go_project:jwt-go:1.0.0
-
cpe:2.3:a:jwt-go_project:jwt-go:1.0.1
-
cpe:2.3:a:jwt-go_project:jwt-go:1.0.2
-
cpe:2.3:a:jwt-go_project:jwt-go:2.0.0
-
cpe:2.3:a:jwt-go_project:jwt-go:2.1.0
-
cpe:2.3:a:jwt-go_project:jwt-go:2.2.0
-
cpe:2.3:a:jwt-go_project:jwt-go:2.3.0
-
cpe:2.3:a:jwt-go_project:jwt-go:2.4.0
-
cpe:2.3:a:jwt-go_project:jwt-go:2.5.0
-
cpe:2.3:a:jwt-go_project:jwt-go:2.6.0
-
cpe:2.3:a:jwt-go_project:jwt-go:2.7.0
-
cpe:2.3:a:jwt-go_project:jwt-go:3.0.0
-
cpe:2.3:a:jwt-go_project:jwt-go:3.1.0
-
cpe:2.3:a:jwt-go_project:jwt-go:3.2.0