CVE-2025-30204

HIGH

golang-jwt <5.2.2,4.5.2 - Info Disclosure

Title source: llm
STIX 2.1

Description

golang-jwt is a Go implementation of JSON Web Tokens. Starting in version 3.2.0 and prior to versions 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2.

Scores

CVSS v3 7.5
EPSS 0.0011
EPSS Percentile 29.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-405
Status published
Products (5)
golang-jwt/jwt 0 - 4.5.2Go
golang-jwt/jwt 3.2.0Go
golang-jwt/jwt 5.0.0-rc.1 - 5.2.2Go
golang-jwt/jwt >= 3.2.0, < 4.5.2
golang-jwt/jwt >= 5.0.0-rc.1, < 5.2.2
Published Mar 21, 2025
Tracked Since Feb 18, 2026