Description
In Firebase PHP-JWT before 6.0.0, an algorithm-confusion issue (e.g., RS256 / HS256) exists via the kid (aka Key ID) header, when multiple types of keys are loaded in a key ring. This allows an attacker to forge tokens that validate under the incorrect key. NOTE: this provides a straightforward way to use the PHP-JWT library unsafely, but might not be considered a vulnerability in the library itself.
References (1)
Core 1
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/firebase/php-jwt/issues/351
Scores
CVSS v3
9.1
EPSS
0.0064
EPSS Percentile
70.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Details
CWE
CWE-843
Status
published
Products (2)
firebase/php-jwt
0 - 6.0.0Packagist
google/firebase_php-jwt
< 6.0.0
Published
Mar 29, 2022
Tracked Since
Feb 18, 2026