File size: 62,363 Bytes
c8d30bc
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
{
  "package": "jwt",
  "source": "NVD",
  "count": 100,
  "vulnerabilities": [
    {
      "cve_id": "CVE-2022-39366",
      "cvss_score": 9.9,
      "severity": "CRITICAL",
      "description": "DataHub is an open-source metadata platform. Prior to version 0.8.45, the `StatelessTokenService` of the DataHub metadata service (GMS) does not verify the signature of JWT tokens. This allows an attacker to connect to DataHub instances as any user if Metadata Service authentication is enabled. This vulnerability occurs because the `StatelessTokenService` of the Metadata service uses the `parse` method of `io.jsonwebtoken.JwtParser`, which does not perform a verification of the cryptographic tok",
      "published": "2022-10-28T17:15:23.590",
      "affected_versions": "< 0.8.45",
      "cpe_vendors": [
        "datahub:datahub"
      ]
    },
    {
      "cve_id": "CVE-2016-8218",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "An issue was discovered in Cloud Foundry Foundation routing-release versions prior to 0.142.0 and cf-release versions 203 to 231. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users to the routing API, aka an \"Unauthenticated JWT signing algorithm in routing\" issue.",
      "published": "2017-06-13T06:29:00.237",
      "affected_versions": "<= 203, 204, 205",
      "cpe_vendors": [
        "cloudfoundry:cf-release",
        "cloudfoundry:routing-release"
      ]
    },
    {
      "cve_id": "CVE-2017-2773",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "An issue was discovered in Pivotal PCF Elastic Runtime 1.6.x versions prior to 1.6.60, 1.7.x versions prior to 1.7.41, 1.8.x versions prior to 1.8.23, and 1.9.x versions prior to 1.9.1. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users in multiple components included in PCF Elastic Runtime, aka an \"Unauthenticated JWT signing algorithm in multiple components\" issue.",
      "published": "2017-06-13T06:29:00.300",
      "affected_versions": "1.6.0, 1.6.1, 1.6.2",
      "cpe_vendors": [
        "pivotal_software:cloud_foundry_elastic_runtime"
      ]
    },
    {
      "cve_id": "CVE-2018-1000125",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "inversoft prime-jwt version prior to version 1.3.0 or prior to commit 0d94dcef0133d699f21d217e922564adbb83a227 contains an input validation vulnerability in JWTDecoder.decode that can result in a JWT that is decoded and thus implicitly validated even if it lacks a valid signature. This attack appear to be exploitable via an attacker crafting a token with a valid header and body and then requests it to be validated. This vulnerability appears to have been fixed in 1.3.0 and later or after commit ",
      "published": "2018-03-13T21:29:00.367",
      "affected_versions": "< 1.3.0",
      "cpe_vendors": [
        "inversoft:prime-jwt"
      ]
    },
    {
      "cve_id": "CVE-2017-18239",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "A time-sensitive equality check on the JWT signature in the JsonWebToken.validate method in main/scala/authentikat/jwt/JsonWebToken.scala in authentikat-jwt (aka com.jason-goodwin/authentikat-jwt) version 0.4.5 and earlier allows the supplier of a JWT token to guess bit after bit of the signature by repeating validation requests.",
      "published": "2018-03-18T03:29:00.213",
      "affected_versions": "<= 0.4.5",
      "cpe_vendors": [
        "authentikat-jwt_project:authentikat-jwt"
      ]
    },
    {
      "cve_id": "CVE-2018-6873",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "The Auth0 authentication service before 2017-10-15 allows privilege escalation because the JWT audience is not validated.",
      "published": "2018-04-04T17:29:01.647",
      "affected_versions": "<= 8.10.1",
      "cpe_vendors": [
        "auth0:auth0.js"
      ]
    },
    {
      "cve_id": "CVE-2019-7644",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "Auth0 Auth0-WCF-Service-JWT before 1.0.4 leaks the expected JWT signature in an error message when it cannot successfully validate the JWT signature. If this error message is presented to an attacker, they can forge an arbitrary JWT token that will be accepted by the vulnerable application.",
      "published": "2019-04-11T20:29:00.760",
      "affected_versions": "< 1.0.4",
      "cpe_vendors": [
        "auth0:auth0-wcf-service-jwt"
      ]
    },
    {
      "cve_id": "CVE-2019-1010263",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "Perl Crypt::JWT prior to 0.023 is affected by: Incorrect Access Control. The impact is: allow attackers to bypass authentication by providing a token by crafting with hmac(). The component is: JWT.pm, line 614. The attack vector is: network connectivity. The fixed version is: after commit b98a59b42ded9f9e51b2560410106207c2152d6c.",
      "published": "2019-07-17T21:15:10.780",
      "affected_versions": "< 0.023",
      "cpe_vendors": [
        "perl_crypt\\:\\"
      ]
    },
    {
      "cve_id": "CVE-2019-1010161",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "perl-CRYPT-JWT 0.022 and earlier is affected by: Incorrect Access Control. The impact is: bypass authentication. The component is: JWT.pm for JWT security token, line 614 in _decode_jws(). The attack vector is: network connectivity(crafting user-controlled input to bypass authentication). The fixed version is: 0.023.",
      "published": "2019-07-25T14:15:11.453",
      "affected_versions": "<= 0.022",
      "cpe_vendors": [
        "perl-crypt-jwt_project:perl-crypt-jwt"
      ]
    },
    {
      "cve_id": "CVE-2019-17195",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.",
      "published": "2019-10-15T14:15:12.380",
      "affected_versions": "< 7.9, 3.2.1, 1.7.0",
      "cpe_vendors": [
        "connect2id:nimbus_jose\\+jwt",
        "apache:hadoop",
        "oracle:communications_cloud_native_core_security_edge_protection_proxy",
        "oracle:communications_pricing_design_center",
        "oracle:data_integrator",
        "oracle:enterprise_manager_base_platform",
        "oracle:healthcare_data_repository",
        "oracle:insurance_policy_administration",
        "oracle:jd_edwards_enterpriseone_orchestrator",
        "oracle:jd_edwards_enterpriseone_tools"
      ]
    },
    {
      "cve_id": "CVE-2019-12511",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "In NETGEAR Nighthawk X10-R9000 prior to 1.0.4.26, an attacker may execute arbitrary system commands as root by sending a specially-crafted MAC address to the \"NETGEAR Genie\" SOAP endpoint at AdvancedQoS:GetCurrentBandwidthByMAC. Although this requires QoS being enabled, advanced QoS being enabled, and a valid authentication JWT, additional vulnerabilities (CVE-2019-12510) allow an attacker to interact with the entire SOAP API without authentication. Additionally, DNS rebinding techniques may be ",
      "published": "2020-02-24T19:15:13.513",
      "affected_versions": "< 1.0.4.26",
      "cpe_vendors": [
        "netgear:nighthawk_x10-r9000_firmware"
      ]
    },
    {
      "cve_id": "CVE-2020-26892",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "The JWT library in NATS nats-server before 2.1.9 has Incorrect Access Control because of how expired credentials are handled.",
      "published": "2020-11-06T08:15:13.610",
      "affected_versions": "< 2.1.9, 33",
      "cpe_vendors": [
        "linuxfoundation:nats-server",
        "fedoraproject:fedora"
      ]
    },
    {
      "cve_id": "CVE-2019-20933",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).",
      "published": "2020-11-19T02:15:11.913",
      "affected_versions": "< 1.7.6, 9.0, 10.0",
      "cpe_vendors": [
        "influxdata:influxdb",
        "debian:debian_linux"
      ]
    },
    {
      "cve_id": "CVE-2021-3199",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "Directory traversal with remote code execution can occur in /upload in ONLYOFFICE Document Server before 5.6.3, when JWT is used, via a /.. sequence in an image upload parameter.",
      "published": "2021-01-26T18:16:28.507",
      "affected_versions": "< 5.6.3",
      "cpe_vendors": [
        "onlyoffice:document_server"
      ]
    },
    {
      "cve_id": "CVE-2021-40494",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "A Hardcoded JWT Secret Key in metadata.py in AdaptiveScale LXDUI through 2.1.3 allows attackers to gain admin access to the host system.",
      "published": "2021-09-03T02:15:06.467",
      "affected_versions": "<= 2.1.3",
      "cpe_vendors": [
        "adaptivescale:lxdui"
      ]
    },
    {
      "cve_id": "CVE-2021-37580",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0",
      "published": "2021-11-16T10:15:07.220",
      "affected_versions": "2.3.0, 2.4.0",
      "cpe_vendors": [
        "apache:shenyu"
      ]
    },
    {
      "cve_id": "CVE-2021-45389",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "A flaw was found with the JWT token. A self-signed JWT token could be injected into the update manager and bypass the authentication process, thus could escalate privileges. This affects StarWind SAN and NAS build 1578 and StarWind Command Center build 6864.",
      "published": "2022-01-04T16:15:09.727",
      "affected_versions": "6864, 1578",
      "cpe_vendors": [
        "starwind:command_center",
        "starwind:san\\&nas"
      ]
    },
    {
      "cve_id": "CVE-2022-22845",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "QXIP SIPCAPTURE homer-app before 1.4.28 for HOMER 7.x has the same 167f0db2-f83e-4baa-9736-d56064a5b415 JWT secret key across different customers' installations.",
      "published": "2022-01-10T14:12:58.567",
      "affected_versions": "< 1.4.28",
      "cpe_vendors": [
        "qxip:homer_webapp"
      ]
    },
    {
      "cve_id": "CVE-2022-35540",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "Hardcoded JWT Secret in AgileConfig <1.6.8 Server allows remote attackers to use the generated JWT token to gain administrator access.",
      "published": "2022-08-18T23:15:08.293",
      "affected_versions": "< 1.6.8",
      "cpe_vendors": [
        "dotnetcore:agileconfig"
      ]
    },
    {
      "cve_id": "CVE-2022-36672",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "Novel-Plus v3.6.2 was discovered to contain a hard-coded JWT key located in the project config file. This vulnerability allows attackers to create a custom user session.",
      "published": "2022-09-01T03:15:16.343",
      "affected_versions": "3.6.2",
      "cpe_vendors": [
        "xxyopen:novel-plus"
      ]
    },
    {
      "cve_id": "CVE-2022-42980",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "go-admin (aka GO Admin) 2.0.12 uses the string go-admin as a production JWT key.",
      "published": "2022-10-17T07:15:08.863",
      "affected_versions": "2.0.12",
      "cpe_vendors": [
        "go-admin:go-admin"
      ]
    },
    {
      "cve_id": "CVE-2022-44796",
      "cvss_score": 9.8,
      "severity": "CRITICAL",
      "description": "An issue was discovered in Object First Ootbi BETA build 1.0.7.712. The authorization service has a flow that allows getting access to the Web UI without knowing credentials. For signing, the JWT token uses a secret key that is generated through a function that doesn't produce cryptographically strong sequences. An attacker can predict these sequences and generate a JWT token. As a result, an attacker can get access to the Web UI. This is fixed in Object First Ootbi BETA build 1.0.13.1611.",
      "published": "2022-11-07T04:15:09.600",
      "affected_versions": "< 1.0.13.1611",
      "cpe_vendors": [
        "objectfirst:ootbi"
      ]
    },
    {
      "cve_id": "CVE-2021-29451",
      "cvss_score": 9.1,
      "severity": "CRITICAL",
      "description": "Portofino is an open source web development framework. Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens. This allows forging a valid JWT. The issue will be patched in the upcoming 5.2.1 release.",
      "published": "2021-04-16T22:15:14.233",
      "affected_versions": "< 5.2.1",
      "cpe_vendors": [
        "manydesigns:portofino"
      ]
    },
    {
      "cve_id": "CVE-2022-39227",
      "cvss_score": 9.1,
      "severity": "CRITICAL",
      "description": "python-jwt is a module for generating and verifying JSON Web Tokens. Versions prior to 3.3.4 are subject to Authentication Bypass by Spoofing, resulting in identity spoofing, session hijacking or authentication bypass. An attacker who obtains a JWT can arbitrarily forge its contents without knowing the secret key. Depending on the application, this may for example enable the attacker to spoof other user's identities, hijack their sessions, or bypass authentication. Users should upgrade to versio",
      "published": "2022-09-23T07:15:09.300",
      "affected_versions": "< 3.3.4",
      "cpe_vendors": [
        "python-jwt_project:python-jwt"
      ]
    },
    {
      "cve_id": "CVE-2019-13423",
      "cvss_score": 8.8,
      "severity": "HIGH",
      "description": "Search Guard Kibana Plugin versions before 5.6.8-7 and before 6.x.y-12 had an issue that an authenticated Kibana user could impersonate as kibanaserver user when providing wrong credentials when all of the following conditions a-c are true: a) Kibana is configured to use Single-Sign-On as authentication method, one of Kerberos, JWT, Proxy, Client certificate. b) The kibanaserver user is configured to use HTTP Basic as the authentication method. c) Search Guard is configured to use an SSO authent",
      "published": "2019-08-23T14:15:11.607",
      "affected_versions": "< 5.6.8-7, < 6.2.3-12",
      "cpe_vendors": [
        "search-guard:search_guard"
      ]
    },
    {
      "cve_id": "CVE-2021-26077",
      "cvss_score": 8.8,
      "severity": "HIGH",
      "description": "Broken Authentication in Atlassian Connect Spring Boot (ACSB) in version 1.1.0 before 2.1.3 and from version 2.1.4 before 2.1.5: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions 1.1.0 before 2.1.3 and versions 2.1.4 before 2.1.5 erroneously accept context JWTs in lifecycle en",
      "published": "2021-05-10T00:15:07.543",
      "affected_versions": "< 2.1.3, < 2.1.5",
      "cpe_vendors": [
        "atlassian:connect_spring_boot"
      ]
    },
    {
      "cve_id": "CVE-2021-24804",
      "cvss_score": 8.8,
      "severity": "HIGH",
      "description": "The Simple JWT Login WordPress plugin before 3.2.1 does not have nonce checks when saving its settings, allowing attackers to make a logged in admin changed them. Settings such as HMAC verification secret, account registering and default user roles can be updated, which could result in site takeover.",
      "published": "2021-11-17T11:15:07.990",
      "affected_versions": "< 3.2.1",
      "cpe_vendors": [
        "simple_jwt_login_project:simple_jwt_login"
      ]
    },
    {
      "cve_id": "CVE-2022-42983",
      "cvss_score": 8.8,
      "severity": "HIGH",
      "description": "anji-plus AJ-Report 0.9.8.6 allows remote attackers to bypass login authentication by spoofing JWT Tokens.",
      "published": "2022-10-17T07:15:08.973",
      "affected_versions": "0.9.8.6",
      "cpe_vendors": [
        "anji-plus:aj-report"
      ]
    },
    {
      "cve_id": "CVE-2020-1764",
      "cvss_score": 8.6,
      "severity": "HIGH",
      "description": "A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.",
      "published": "2020-03-26T13:15:13.203",
      "affected_versions": "< 1.15.1, 1.0",
      "cpe_vendors": [
        "kiali:kiali",
        "redhat:openshift_service_mesh"
      ]
    },
    {
      "cve_id": "CVE-2021-22190",
      "cvss_score": 8.5,
      "severity": "HIGH",
      "description": "A path traversal vulnerability via the GitLab Workhorse in all versions of GitLab could result in the leakage of a JWT token",
      "published": "2021-04-12T15:15:14.517",
      "affected_versions": "< 13.7.8, < 13.7.8, < 13.8.5",
      "cpe_vendors": [
        "gitlab:gitlab"
      ]
    },
    {
      "cve_id": "CVE-2021-32753",
      "cvss_score": 8.3,
      "severity": "HIGH",
      "description": "EdgeX Foundry is an open source project for building a common open framework for internet-of-things edge computing. A vulnerability exists in the Edinburgh, Fuji, Geneva, and Hanoi versions of the software. When the EdgeX API gateway is configured for OAuth2 authentication and a proxy user is created, the client_id and client_secret required to obtain an OAuth2 authentication token are set to the username of the proxy user. A remote network attacker can then perform a dictionary-based password a",
      "published": "2021-07-09T19:15:08.373",
      "affected_versions": "< 2.0.0",
      "cpe_vendors": [
        "edgexfoundry:edgex_foundry"
      ]
    },
    {
      "cve_id": "CVE-2020-7787",
      "cvss_score": 8.2,
      "severity": "HIGH",
      "description": "This affects all versions of package react-adal. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated",
      "published": "2020-12-09T17:15:32.027",
      "affected_versions": "",
      "cpe_vendors": [
        "react-adal_project:react-adal"
      ]
    },
    {
      "cve_id": "CVE-2021-21378",
      "cvss_score": 8.2,
      "severity": "HIGH",
      "description": "Envoy is a cloud-native high-performance edge/middle/service proxy. In Envoy version 1.17.0 an attacker can bypass authentication by presenting a JWT token with an issuer that is not in the provider list when Envoy's JWT Authentication filter is configured with the `allow_missing` requirement under `requires_any` due to a mistake in implementation. Envoy's JWT Authentication filter can be configured with the `allow_missing` requirement that will be satisfied if JWT is missing (JwtMissed error) a",
      "published": "2021-03-11T03:15:12.163",
      "affected_versions": "1.17.0",
      "cpe_vendors": [
        "envoyproxy:envoy"
      ]
    },
    {
      "cve_id": "CVE-2022-36089",
      "cvss_score": 8.2,
      "severity": "HIGH",
      "description": "KubeVela is an application delivery platform Users using KubeVela's VelaUX APIServer could be affected by an authentication bypass vulnerability. In KubeVela prior to versions 1.4.11 and 1.5.4, VelaUX APIServer uses the `PlatformID` as the signed key to generate the JWT tokens for users. Another API called `getSystemInfo` exposes the platformID. This vulnerability allows users to use the platformID to re-generate the JWT tokens to bypass the authentication. Versions 1.4.11 and 1.5.4 contain a pa",
      "published": "2022-09-07T23:15:14.240",
      "affected_versions": "< 1.4.11, < 1.5.3",
      "cpe_vendors": [
        "kubevela:kubevela"
      ]
    },
    {
      "cve_id": "CVE-2018-1000025",
      "cvss_score": 8.1,
      "severity": "HIGH",
      "description": "Jerome Gamez Firebase Admin SDK for PHP version from 3.2.0 to 3.8.0 contains a Incorrect Access Control vulnerability in src/Firebase/Auth/IdTokenVerifier.php does not verify for token signature that can result in JWT with any email address and user ID could be forged from an actual token, or from thin air. This attack appear to be exploitable via Attacker would only need to know email address of the victim on most cases.. This vulnerability appears to have been fixed in 3.8.1.",
      "published": "2018-02-09T23:29:00.777",
      "affected_versions": "<= 3.8.0",
      "cpe_vendors": [
        "firebase_admin_sdk_for_php_project:firebase_admin_sdk_for_php"
      ]
    },
    {
      "cve_id": "CVE-2021-29492",
      "cvss_score": 8.1,
      "severity": "HIGH",
      "description": "Envoy is a cloud-native edge/middle/service proxy. Envoy does not decode escaped slash sequences `%2F` and `%5C` in HTTP URL paths in versions 1.18.2 and before. A remote attacker may craft a path with escaped slashes, e.g. `/something%2F..%2Fadmin`, to bypass access control, e.g. a block on `/admin`. A backend server could then decode slash sequences and normalize path and provide an attacker access beyond the scope provided for by the access control policy. ### Impact Escalation of Privileges ",
      "published": "2021-05-28T21:15:08.670",
      "affected_versions": "< 1.15.5, < 1.16.4, < 1.17.3",
      "cpe_vendors": [
        "envoyproxy:envoy"
      ]
    },
    {
      "cve_id": "CVE-2022-24844",
      "cvss_score": 8.1,
      "severity": "HIGH",
      "description": "Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. The problem occurs in the following code in server/service/system/sys_auto_code_pgsql.go, which means that PostgreSQL must be used as the database for this vulnerability to occur. Users must: Require JWT login) and be using PostgreSQL to be affected. This issue has been resolved in version 2.5.1. There are no known workarounds.",
      "published": "2022-04-13T21:15:07.887",
      "affected_versions": "< 2.5.1",
      "cpe_vendors": [
        "gin-vue-admin_project:gin-vue-admin"
      ]
    },
    {
      "cve_id": "CVE-2022-29060",
      "cvss_score": 8.1,
      "severity": "HIGH",
      "description": "A use of hard-coded cryptographic key vulnerability [CWE-321] in FortiDDoS API 5.5.0 through 5.5.1, 5.4.0 through 5.4.2, 5.3.0 through 5.3.1, 5.2.0, 5.1.0 may allow an attacker who managed to retrieve the key from one device to sign JWT tokens for any device.",
      "published": "2022-07-19T14:15:08.603",
      "affected_versions": "5.1.0, 5.2.0, 5.3.0",
      "cpe_vendors": [
        "fortinet:fortiddos"
      ]
    },
    {
      "cve_id": "CVE-2021-26073",
      "cvss_score": 7.7,
      "severity": "HIGH",
      "description": "Broken Authentication in Atlassian Connect Express (ACE) from version 3.0.2 before version 6.6.0: Atlassian Connect Express is a Node.js package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Express app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Express versions from 3.0.2 before 6.6.0 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accep",
      "published": "2021-04-16T03:15:12.033",
      "affected_versions": "< 6.6.0",
      "cpe_vendors": [
        "atlassian:connect_express"
      ]
    },
    {
      "cve_id": "CVE-2022-25898",
      "cvss_score": 7.7,
      "severity": "HIGH",
      "description": "The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.",
      "published": "2022-07-01T20:15:08.023",
      "affected_versions": "< 10.5.25",
      "cpe_vendors": [
        "jsrsasign_project:jsrsasign"
      ]
    },
    {
      "cve_id": "CVE-2016-7037",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "The verify function in Encryption/Symmetric.php in Malcolm Fell jwt before 1.0.3 does not use a timing-safe function for hash comparison, which allows attackers to spoof signatures via a timing attack.",
      "published": "2017-01-23T21:59:02.487",
      "affected_versions": "<= 1.0.2",
      "cpe_vendors": [
        "emarref:jwt"
      ]
    },
    {
      "cve_id": "CVE-2017-11424",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "In PyJWT 1.5.0 and below the `invalid_strings` check in `HMACAlgorithm.prepare_key` does not account for all PEM encoded public keys. Specifically, the PKCS1 PEM encoded format would be allowed because it is prefaced with the string `-----BEGIN RSA PUBLIC KEY-----` which is not accounted for. This enables symmetric/asymmetric key confusion attacks against users using the PKCS1 PEM encoded public keys, which would allow an attacker to craft JWTs from scratch.",
      "published": "2017-08-24T16:29:00.197",
      "affected_versions": "<= 1.5.0, 8.0, 9.0",
      "cpe_vendors": [
        "pyjwt_project:pyjwt",
        "debian:debian_linux"
      ]
    },
    {
      "cve_id": "CVE-2018-1000531",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "inversoft prime-jwt version prior to commit abb0d479389a2509f939452a6767dc424bb5e6ba contains a CWE-20 vulnerability in JWTDecoder.decode that can result in an incorrect signature validation of a JWT token. This attack can be exploitable when an attacker crafts a JWT token with a valid header using 'none' as algorithm and a body to requests it be validated. This vulnerability was fixed after commit abb0d479389a2509f939452a6767dc424bb5e6ba.",
      "published": "2018-06-26T16:29:01.807",
      "affected_versions": "<= 1.3.0",
      "cpe_vendors": [
        "inversoft:prime-jwt"
      ]
    },
    {
      "cve_id": "CVE-2019-12995",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "Istio before 1.2.2 mishandles certain access tokens, leading to \"Epoch 0 terminated with an error\" in Envoy. This is related to a jwt_authenticator.cc segmentation fault.",
      "published": "2019-06-28T10:15:11.487",
      "affected_versions": "< 1.2.2",
      "cpe_vendors": [
        "istio:istio"
      ]
    },
    {
      "cve_id": "CVE-2019-1020015",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "graphql-engine (aka Hasura GraphQL Engine) before 1.0.0-beta.3 mishandles the audience check while verifying JWT.",
      "published": "2019-07-29T13:15:12.090",
      "affected_versions": "< 1.0.0, 1.0.0, 1.0.0",
      "cpe_vendors": [
        "hasura:graphql_engine"
      ]
    },
    {
      "cve_id": "CVE-2019-14993",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.",
      "published": "2019-08-13T18:15:13.117",
      "affected_versions": "< 1.1.13, < 1.2.4",
      "cpe_vendors": [
        "istio:istio"
      ]
    },
    {
      "cve_id": "CVE-2019-19324",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "Xmidt cjwt through 1.0.1 before 2019-11-25 maps unsupported algorithms to alg=none, which sometimes leads to untrusted accidental JWT acceptance.",
      "published": "2020-03-20T18:15:13.857",
      "affected_versions": "< 2019-11-25",
      "cpe_vendors": [
        "xmidt:cjwt"
      ]
    },
    {
      "cve_id": "CVE-2020-15957",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "An issue was discovered in DP3T-Backend-SDK before 1.1.1 for Decentralised Privacy-Preserving Proximity Tracing (DP3T). When it is configured to check JWT before uploading/publishing keys, it is possible to skip the signature check by providing a JWT token with alg=none.",
      "published": "2020-07-30T14:15:12.260",
      "affected_versions": "< 1.1.1",
      "cpe_vendors": [
        "dp3t-backend-software_development_kit_project:dp3t-backend-software_development_kit"
      ]
    },
    {
      "cve_id": "CVE-2020-26160",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m[\"aud\"] (which is allowed by the specification). Because the type assertion fails, \"\" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.",
      "published": "2020-09-30T18:15:27.397",
      "affected_versions": "<= 3.2.0",
      "cpe_vendors": [
        "jwt-go_project:jwt-go"
      ]
    },
    {
      "cve_id": "CVE-2020-26511",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "The wpo365-login plugin before v11.7 for WordPress allows use of a symmetric algorithm to decrypt a JWT token. This leads to authentication bypass.",
      "published": "2020-10-02T05:15:12.457",
      "affected_versions": "< 11.7",
      "cpe_vendors": [
        "wpo365:wordpress_\\+_azure_ad_\\/_microsoft_office_365"
      ]
    },
    {
      "cve_id": "CVE-2020-26521",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "The JWT library in NATS nats-server before 2.1.9 allows a denial of service (a nil dereference in Go code).",
      "published": "2020-11-06T08:15:13.563",
      "affected_versions": "< 2.1.9, 33",
      "cpe_vendors": [
        "linuxfoundation:nats-server",
        "fedoraproject:fedora"
      ]
    },
    {
      "cve_id": "CVE-2021-3127",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled.",
      "published": "2021-03-16T20:15:13.300",
      "affected_versions": "< 2.2.0, < 2.0.1",
      "cpe_vendors": [
        "linuxfoundation:nats-server",
        "nats:jwt_library"
      ]
    },
    {
      "cve_id": "CVE-2021-27306",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "An improper access control vulnerability in the JWT plugin in Kong Gateway prior to 2.3.2.0 allows unauthenticated users access to authenticated routes without a valid token JWT.",
      "published": "2021-03-18T15:15:16.230",
      "affected_versions": "< 2.3.2.0",
      "cpe_vendors": [
        "konghq:kong_gateway"
      ]
    },
    {
      "cve_id": "CVE-2021-22696",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a \"request\" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the \"request_uri\" parameter. CXF was not validating the \"request_uri\" parameter (apart from ensuring it uses \"https) and was making a REST request to the para",
      "published": "2021-04-02T10:15:12.200",
      "affected_versions": "< 3.3.10, < 3.4.3, 5.5.0.0.0",
      "cpe_vendors": [
        "apache:cxf",
        "oracle:business_intelligence",
        "oracle:communications_diameter_intelligence_hub",
        "oracle:communications_element_manager",
        "oracle:communications_session_report_manager",
        "oracle:communications_session_route_manager"
      ]
    },
    {
      "cve_id": "CVE-2021-29455",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "Grassroot Platform is an application to make it faster, cheaper and easier to persistently organize and mobilize people in low-income communities. Grassroot Platform before master deployment as of 2021-04-16 did not properly verify the signature of JSON Web Tokens when refreshing an existing JWT. This allows to forge a valid JWT. The problem has been patched in version 1.3.1 by deprecating the JWT refresh function, which was an overdue deprecation regardless (the \"refresh\" flow is no longer used",
      "published": "2021-04-19T19:15:17.827",
      "affected_versions": "< 1.3.1",
      "cpe_vendors": [
        "grassroot:grassroot_platform"
      ]
    },
    {
      "cve_id": "CVE-2021-29500",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "bubble fireworks is an open source java package relating to Spring Framework. In bubble fireworks before version 2021.BUILD-SNAPSHOT there is a vulnerability in which the package did not properly verify the signature of JSON Web Tokens. This allows to forgery of valid JWTs.",
      "published": "2021-06-04T20:15:07.763",
      "affected_versions": "< 2021.build-snapshot",
      "cpe_vendors": [
        "bubble_fireworks_project:bubble_fireworks"
      ]
    },
    {
      "cve_id": "CVE-2021-29157",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access to the local filesystem can trick OAuth2 authentication into using an HS256 validation key from an attacker-controlled location. This occurs during use of local JWT validation with the posix fs driver.",
      "published": "2021-06-28T12:15:08.647",
      "affected_versions": "< 2.3.14.1, 33, 34",
      "cpe_vendors": [
        "dovecot:dovecot",
        "fedoraproject:fedora"
      ]
    },
    {
      "cve_id": "CVE-2021-35342",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "The useradm service 1.14.0 (in Northern.tech Mender Enterprise 2.7.x before 2.7.1) and 1.13.0 (in Northern.tech Mender Enterprise 2.6.x before 2.6.1) allows users to access the system with their JWT token after logout, because of missing invalidation (if the JWT verification cache is enabled).",
      "published": "2021-08-27T10:15:07.793",
      "affected_versions": "1.14.0, 1.13.0",
      "cpe_vendors": [
        "northern.tech:useradm"
      ]
    },
    {
      "cve_id": "CVE-2021-44877",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to Incorrect Access Control. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. A broken access control vulnerability has been found while using a temporary generated token in order to consume api resources. The vulnerability allows an unauthenticated attacker to use an api endpoint to generate a temporary JWT token that ",
      "published": "2021-12-21T17:15:08.590",
      "affected_versions": "2.22.8",
      "cpe_vendors": [
        "dalmark:systeam_enterprise_resource_planning"
      ]
    },
    {
      "cve_id": "CVE-2021-24998",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "The Simple JWT Login WordPress plugin before 3.3.0 can be used to create new WordPress user accounts with a randomly generated password. The password is generated using the str_shuffle  PHP function that \"does not generate cryptographically secure values, and should not be used for cryptographic purposes\" according to PHP's documentation.",
      "published": "2021-12-27T11:15:09.517",
      "affected_versions": "< 3.3.0",
      "cpe_vendors": [
        "simple_jwt_login_project:simple_jwt_login"
      ]
    },
    {
      "cve_id": "CVE-2021-43824",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions a crafted request crashes Envoy when a CONNECT request is sent to JWT filter configured with regex match. This provides a denial of service attack vector. The only workaround is to not use regex in the JWT filter. Users are advised to upgrade.",
      "published": "2022-02-22T23:15:10.813",
      "affected_versions": "< 1.18.6, < 1.19.3, < 1.20.2",
      "cpe_vendors": [
        "envoyproxy:envoy"
      ]
    },
    {
      "cve_id": "CVE-2022-22332",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "IBM Sterling Partner Engagement Manager 6.2.0 could allow an attacker to impersonate another user due to missing revocation mechanism for the JWT token. IBM X-Force ID: 219131.",
      "published": "2022-04-01T17:15:09.897",
      "affected_versions": "6.2.0",
      "cpe_vendors": [
        "ibm:partner_engagement_manager"
      ]
    },
    {
      "cve_id": "CVE-2022-29266",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "In APache APISIX before 3.13.1, the jwt-auth plugin has a security issue that leaks the user's secret key because the error message returned from the dependency lua-resty-jwt contains sensitive information.",
      "published": "2022-04-20T08:15:07.740",
      "affected_versions": "< 2.13.1",
      "cpe_vendors": [
        "apache:apisix"
      ]
    },
    {
      "cve_id": "CVE-2022-36065",
      "cvss_score": 7.5,
      "severity": "HIGH",
      "description": "GrowthBook is an open-source platform for feature flagging and A/B testing. With some self-hosted configurations in versions prior to 2022-08-29, attackers can register new accounts and upload files to arbitrary directories within the container. If the attacker uploads a Python script to the right location, they can execute arbitrary code within the container. To be affected, ALL of the following must be true: Self-hosted deployment (GrowthBook Cloud is unaffected); using local file uploads (as ",
      "published": "2022-09-06T21:15:08.760",
      "affected_versions": "< 1.6.0",
      "cpe_vendors": [
        "growthbook:growthbook"
      ]
    },
    {
      "cve_id": "CVE-2018-15801",
      "cvss_score": 7.4,
      "severity": "HIGH",
      "description": "Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer.",
      "published": "2018-12-19T22:29:00.593",
      "affected_versions": "< 5.1.2",
      "cpe_vendors": [
        "vmware:spring_framework"
      ]
    },
    {
      "cve_id": "CVE-2020-15240",
      "cvss_score": 7.4,
      "severity": "HIGH",
      "description": "omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly validate the JWT token signature when using the `jwt_validator.verify` method. Improper validation of the JWT token signature can allow an attacker to bypass authentication and authorization. You are affected by this vulnerability if all of the following conditions apply: 1. You are using `omniauth-auth0`. 2. You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Co",
      "published": "2020-10-21T18:15:12.813",
      "affected_versions": "< 2.4.1",
      "cpe_vendors": [
        "auth0:omniauth-auth0"
      ]
    },
    {
      "cve_id": "CVE-2021-39177",
      "cvss_score": 7.4,
      "severity": "HIGH",
      "description": "Geyser is a bridge between Minecraft: Bedrock Edition and Minecraft: Java Edition. Versions of Geyser prior to 1.4.2-SNAPSHOT allow anyone that can connect to the server to forge a LoginPacket with manipulated JWT token allowing impersonation as any user. Version 1.4.2-SNAPSHOT contains a patch for the issue. There are no known workarounds aside from upgrading.",
      "published": "2021-08-30T23:15:07.070",
      "affected_versions": "< 1.4.2",
      "cpe_vendors": [
        "geysermc:geyser"
      ]
    },
    {
      "cve_id": "CVE-2022-29217",
      "cvss_score": 7.4,
      "severity": "HIGH",
      "description": "PyJWT is a Python implementation of RFC 7519. PyJWT supports multiple different JWT signing algorithms. With JWT, an attacker submitting the JWT token can choose the used signing algorithm. The PyJWT library requires that the application chooses what algorithms are supported. The application can specify `jwt.algorithms.get_default_algorithms()` to get support for all algorithms, or specify a single algorithm. The issue is not that big as `algorithms=jwt.algorithms.get_default_algorithms()` has t",
      "published": "2022-05-24T15:15:07.767",
      "affected_versions": "< 2.4.0, 35, 36",
      "cpe_vendors": [
        "pyjwt_project:pyjwt",
        "fedoraproject:fedora"
      ]
    },
    {
      "cve_id": "CVE-2019-13483",
      "cvss_score": 7.3,
      "severity": "HIGH",
      "description": "Auth0 Passport-SharePoint before 0.4.0 does not validate the JWT signature of an Access Token before processing. This allows attackers to forge tokens and bypass authentication and authorization mechanisms.",
      "published": "2019-07-25T20:15:11.730",
      "affected_versions": "< 0.4.0",
      "cpe_vendors": [
        "auth0:passport-sharepoint"
      ]
    },
    {
      "cve_id": "CVE-2020-8595",
      "cvss_score": 7.3,
      "severity": "HIGH",
      "description": "Istio versions 1.2.10 (End of Life) and prior, 1.3 through 1.3.7, and 1.4 through 1.4.3 allows authentication bypass. The Authentication Policy exact-path matching logic can allow unauthorized access to HTTP paths even if they are configured to be only accessed after presenting a valid JWT token. For example, an attacker can add a ? or # character to a URI that would otherwise satisfy an exact-path match.",
      "published": "2020-02-12T15:15:14.727",
      "affected_versions": "<= 1.3.7, <= 1.4.3, 1.0",
      "cpe_vendors": [
        "istio:istio",
        "redhat:openshift_service_mesh"
      ]
    },
    {
      "cve_id": "CVE-2021-41803",
      "cvss_score": 7.1,
      "severity": "HIGH",
      "description": "HashiCorp Consul 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 do not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC. Fixed in 1.11.9, 1.12.5, and 1.13.2.\"",
      "published": "2022-09-23T01:15:08.623",
      "affected_versions": "< 1.11.9, < 1.11.9, 1.12.4",
      "cpe_vendors": [
        "hashicorp:consul"
      ]
    },
    {
      "cve_id": "CVE-2020-1762",
      "cvss_score": 7.0,
      "severity": "HIGH",
      "description": "An insufficient JWT validation vulnerability was found in Kiali versions 0.4.0 to 1.15.0 and was fixed in Kiali version 1.15.1, wherein a remote attacker could abuse this flaw by stealing a valid JWT cookie and using that to spoof a user session, possibly gaining privileges to view and alter the Istio configuration.",
      "published": "2020-04-27T21:15:13.717",
      "affected_versions": "< 1.15.1, 1.0",
      "cpe_vendors": [
        "kiali:kiali",
        "redhat:openshift_service_mesh"
      ]
    },
    {
      "cve_id": "CVE-2016-10555",
      "cvss_score": 6.5,
      "severity": "MEDIUM",
      "description": "Since \"algorithm\" isn't enforced in jwt.decode()in jwt-simple 0.3.0 and earlier, a malicious user could choose what algorithm is sent sent to the server. If the server is expecting RSA but is sent HMAC-SHA with RSA's public key, the server will think the public key is actually an HMAC private key. This could be used to forge any data an attacker wants.",
      "published": "2018-05-31T20:29:02.067",
      "affected_versions": "<= 0.3.0",
      "cpe_vendors": [
        "jwt-simple_project:jwt-simple"
      ]
    },
    {
      "cve_id": "CVE-2018-11537",
      "cvss_score": 6.5,
      "severity": "MEDIUM",
      "description": "Auth0 angular-jwt before 0.1.10 treats whiteListedDomains entries as regular expressions, which allows remote attackers with knowledge of the jwtInterceptorProvider.whiteListedDomains setting to bypass the domain whitelist filter via a crafted domain.",
      "published": "2018-06-19T19:29:00.377",
      "affected_versions": "< 0.1.10",
      "cpe_vendors": [
        "auth0:angular-jwt"
      ]
    },
    {
      "cve_id": "CVE-2021-3167",
      "cvss_score": 6.5,
      "severity": "MEDIUM",
      "description": "In Cloudera Data Engineering (CDE) 1.3.0, JWT authentication tokens are exposed to administrators in virtual cluster server logs.",
      "published": "2021-03-15T16:15:13.810",
      "affected_versions": "1.3.0",
      "cpe_vendors": [
        "cloudera:data_engineering"
      ]
    },
    {
      "cve_id": "CVE-2021-26074",
      "cvss_score": 6.5,
      "severity": "MEDIUM",
      "description": "Broken Authentication in Atlassian Connect Spring Boot (ACSB) from version 1.1.0 before version 2.1.3: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions from version 1.1.0 before version 2.1.3 erroneously accept context JWTs in lifecycle endpoints (such as installation) where ",
      "published": "2021-04-16T03:15:12.113",
      "affected_versions": "< 2.1.3",
      "cpe_vendors": [
        "atlassian:connect_spring_boot"
      ]
    },
    {
      "cve_id": "CVE-2020-36124",
      "cvss_score": 6.5,
      "severity": "MEDIUM",
      "description": "Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by XML External Entity (XXE) injection. An authenticated attacker can compromise the private keys of a JWT token and reuse them to manipulate the access tokens to access the platform as any desired user (clients and administrators).",
      "published": "2021-05-07T11:15:08.040",
      "affected_versions": "<= 7.0.8_20200511171508",
      "cpe_vendors": [
        "paxtechnology:paxstore"
      ]
    },
    {
      "cve_id": "CVE-2021-32631",
      "cvss_score": 6.5,
      "severity": "MEDIUM",
      "description": "Common is a package of common modules that can be accessed by NIMBLE services. Common before commit number 3b96cb0293d3443b870351945f41d7d55cb34b53 did not properly verify the signature of JSON Web Tokens. This allows someone to forge a valid JWT. Being able to forge JWTs may lead to authentication bypasses. Commit number 3b96cb0293d3443b870351945f41d7d55cb34b53 contains a patch for the issue. As a workaround, one may use the parseClaimsJws method to correctly verify the signature of a JWT.",
      "published": "2021-07-26T16:15:07.637",
      "affected_versions": "",
      "cpe_vendors": [
        "nimble-project:common"
      ]
    },
    {
      "cve_id": "CVE-2021-23207",
      "cvss_score": 6.5,
      "severity": "MEDIUM",
      "description": "An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.",
      "published": "2022-01-21T19:15:08.063",
      "affected_versions": "<= d25, <= 3.3.0, 1.0",
      "cpe_vendors": [
        "fresenius-kabi:agilia_connect",
        "fresenius-kabi:agilia_partner_maintenance_software",
        "fresenius-kabi:vigilant_centerium",
        "fresenius-kabi:vigilant_insight",
        "fresenius-kabi:vigilant_mastermed",
        "fresenius-kabi:link\\+_agilia_firmware"
      ]
    },
    {
      "cve_id": "CVE-2022-22311",
      "cvss_score": 6.5,
      "severity": "MEDIUM",
      "description": "IBM Security Verify Access could allow a user, using man in the middle techniques, to obtain sensitive information or possibly change some information due to improper validiation of JWT tokens.",
      "published": "2022-03-31T18:15:09.437",
      "affected_versions": "10.0.0, 10.0.1, 10.0.2",
      "cpe_vendors": [
        "ibm:security_verify_access"
      ]
    },
    {
      "cve_id": "CVE-2020-10689",
      "cvss_score": 6.4,
      "severity": "MEDIUM",
      "description": "A flaw was found in the Eclipse Che up to version 7.8.x, where it did not properly restrict access to workspace pods. An authenticated user can exploit this flaw to bypass JWT proxy and gain access to the workspace pods of another user. Successful exploitation requires knowledge of the service name and namespace of the target pod.",
      "published": "2020-04-03T15:15:14.420",
      "affected_versions": "< 7.9.0",
      "cpe_vendors": [
        "eclipse:che"
      ]
    },
    {
      "cve_id": "CVE-2021-41130",
      "cvss_score": 6.4,
      "severity": "MEDIUM",
      "description": "Extensible Service Proxy, a.k.a. ESP is a proxy which enables API management capabilities for JSON/REST or gRPC API services. ESPv1 can be configured to authenticate a JWT token. Its verified JWT claim is passed to the application by HTTP header \"X-Endpoint-API-UserInfo\", the application can use it to do authorization. But if there are two \"X-Endpoint-API-UserInfo\" headers from the client, ESPv1 only replaces the first one, the 2nd one will be passed to the application. An attacker can send two ",
      "published": "2021-10-07T19:15:08.843",
      "affected_versions": "< 1.58.0",
      "cpe_vendors": [
        "google:extensible_service_proxy"
      ]
    },
    {
      "cve_id": "CVE-2021-3509",
      "cvss_score": 6.1,
      "severity": "MEDIUM",
      "description": "A flaw was found in Red Hat Ceph Storage 4, in the Dashboard component. In response to CVE-2020-27839, the JWT token was moved from localStorage to an httpOnly cookie. However, token cookies are used in the body of the HTTP response for the documentation, which again makes it available to XSS.The greatest threat to the system is for confidentiality, integrity, and availability.",
      "published": "2021-05-27T00:15:08.577",
      "affected_versions": "4.0",
      "cpe_vendors": [
        "redhat:ceph_storage"
      ]
    },
    {
      "cve_id": "CVE-2017-8932",
      "cvss_score": 5.9,
      "severity": "MEDIUM",
      "description": "A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go before 1.7.6 and 1.8.x before 1.8.2 causes incorrect results to be generated for specific input points. An adaptive attack can be mounted to progressively extract the scalar input to ScalarMult by submitting crafted points and observing failures to the derive correct output. This leads to a full key recovery attack against static ECDH, as used in popular JWT libraries.",
      "published": "2017-07-06T16:29:00.420",
      "affected_versions": "<= 1.7.5, 1.8, 1.8.1",
      "cpe_vendors": [
        "golang:go",
        "novell:suse_package_hub_for_suse_linux_enterprise",
        "fedoraproject:fedora",
        "opensuse:leap"
      ]
    },
    {
      "cve_id": "CVE-2018-8023",
      "cvss_score": 5.9,
      "severity": "MEDIUM",
      "description": "Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation fun",
      "published": "2018-09-21T13:29:01.140",
      "affected_versions": "< 1.4.2, 1.5.0, 1.5.1",
      "cpe_vendors": [
        "apache:mesos"
      ]
    },
    {
      "cve_id": "CVE-2021-26833",
      "cvss_score": 5.9,
      "severity": "MEDIUM",
      "description": "Cleartext Storage in a File or on Disk in TimelyBills <= 1.7.0 for iOS and versions <= 1.21.115 for Android allows attacker who can locally read user's files obtain JWT tokens for user's account due to insufficient cache clearing mechanisms. A threat actor can obtain sensitive user data by decoding the tokens as JWT is signed and encoded, not encrypted.",
      "published": "2021-04-06T16:15:16.457",
      "affected_versions": "<= 1.7.0, <= 1.21.115",
      "cpe_vendors": [
        "timelybills:timelybills"
      ]
    },
    {
      "cve_id": "CVE-2021-33846",
      "cvss_score": 5.9,
      "severity": "MEDIUM",
      "description": "Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 issues authentication tokens to authenticated users that are signed with a symmetric encryption key. An attacker in possession of the key can issue valid JWTs and impersonate arbitrary users.",
      "published": "2022-01-21T19:15:09.007",
      "affected_versions": "<= 3.3.0, 1.0, 1.0",
      "cpe_vendors": [
        "fresenius-kabi:agilia_partner_maintenance_software",
        "fresenius-kabi:vigilant_centerium",
        "fresenius-kabi:vigilant_insight",
        "fresenius-kabi:vigilant_mastermed",
        "fresenius-kabi:agilia_connect_firmware",
        "fresenius-kabi:link\\+_agilia_firmware"
      ]
    },
    {
      "cve_id": "CVE-2020-5300",
      "cvss_score": 5.8,
      "severity": "MEDIUM",
      "description": "In Hydra (an OAuth2 Server and OpenID Certified™ OpenID Connect Provider written in Go), before version 1.4.0+oryOS.17, when using client authentication method 'private_key_jwt' [1], OpenId specification says the following about assertion `jti`: \"A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties\". Hydra does not check the uniqueness of this `jti` value. Exploitin",
      "published": "2020-04-06T17:15:13.367",
      "affected_versions": "< 1.4.0",
      "cpe_vendors": [
        "ory:hydra"
      ]
    },
    {
      "cve_id": "CVE-2021-25993",
      "cvss_score": 5.4,
      "severity": "MEDIUM",
      "description": "In Requarks wiki.js, versions 2.0.0-beta.147 to 2.5.255 are affected by Stored XSS vulnerability, where a low privileged (editor) user can upload a SVG file that contains malicious JavaScript while uploading assets in the page. That will send the JWT tokens to the attacker’s server and will lead to account takeover when accessed by the victim.",
      "published": "2021-12-29T17:15:07.483",
      "affected_versions": "<= 2.5.255, 2.0.0, 2.0.0",
      "cpe_vendors": [
        "requarks:wiki.js"
      ]
    },
    {
      "cve_id": "CVE-2017-10862",
      "cvss_score": 5.3,
      "severity": "MEDIUM",
      "description": "jwt-scala 1.2.2 and earlier fails to verify token signatures correctly which may lead to an attacker being able to pass specially crafted JWT data as a correctly signed token.",
      "published": "2017-10-12T14:29:00.263",
      "affected_versions": "<= 1.2.2",
      "cpe_vendors": [
        "really:jwt-scala"
      ]
    },
    {
      "cve_id": "CVE-2017-8031",
      "cvss_score": 5.3,
      "severity": "MEDIUM",
      "description": "An issue was discovered in Cloud Foundry Foundation cf-release (all versions prior to v279) and UAA (30.x versions prior to 30.6, 45.x versions prior to 45.4, 52.x versions prior to 52.1). In some cases, the UAA allows an authenticated user for a particular client to revoke client tokens for other users on the same client. This occurs only if the client is using opaque tokens or JWT tokens validated using the check_token endpoint. A malicious actor could cause denial of service.",
      "published": "2017-11-27T10:29:00.767",
      "affected_versions": "<= 278, < 30.6, < 45.4",
      "cpe_vendors": [
        "cloudfoundry:cf-release",
        "cloudfoundry:uaa-release"
      ]
    },
    {
      "cve_id": "CVE-2020-4072",
      "cvss_score": 5.3,
      "severity": "MEDIUM",
      "description": "In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.",
      "published": "2020-06-25T20:15:11.350",
      "affected_versions": "< 1.7.0",
      "cpe_vendors": [
        "jhipster:generator-jhipster-kotlin"
      ]
    },
    {
      "cve_id": "CVE-2020-28042",
      "cvss_score": 5.3,
      "severity": "MEDIUM",
      "description": "ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature.",
      "published": "2020-11-02T21:15:31.320",
      "affected_versions": "< 5.9.2",
      "cpe_vendors": [
        "servicestack:servicestack"
      ]
    },
    {
      "cve_id": "CVE-2022-36083",
      "cvss_score": 5.3,
      "severity": "MEDIUM",
      "description": "JOSE is \"JSON Web Almost Everything\" - JWA, JWS, JWE, JWT, JWK, JWKS with no dependencies using runtime's native crypto in Node.js, Browser, Cloudflare Workers, Electron, and Deno. The PBKDF2-based JWE key management algorithms expect a JOSE Header Parameter named `p2c` PBES2 Count, which determines how many PBKDF2 iterations must be executed in order to derive a CEK wrapping key. The purpose of this parameter is to intentionally slow down the key derivation function in order to make password br",
      "published": "2022-09-07T22:15:08.657",
      "affected_versions": "< 1.28.2, < 2.0.6, < 3.20.4",
      "cpe_vendors": [
        "jose_project:jose"
      ]
    },
    {
      "cve_id": "CVE-2021-27884",
      "cvss_score": 5.1,
      "severity": "MEDIUM",
      "description": "Weak JSON Web Token (JWT) signing secret generation in YMFE YApi through 1.9.2 allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used.",
      "published": "2021-03-01T23:15:13.267",
      "affected_versions": "<= 1.9.2",
      "cpe_vendors": [
        "ymfe:yapi"
      ]
    },
    {
      "cve_id": "CVE-2015-2951",
      "cvss_score": 5.0,
      "severity": "MEDIUM",
      "description": "JWT.php in F21 JWT before 2.0 allows remote attackers to bypass signature verification via crafted tokens.",
      "published": "2015-06-05T10:59:05.380",
      "affected_versions": "<= 1.0",
      "cpe_vendors": [
        "f21:jwt"
      ]
    },
    {
      "cve_id": "CVE-2022-31130",
      "cvss_score": 4.9,
      "severity": "MEDIUM",
      "description": "Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user's Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication",
      "published": "2022-10-13T23:15:09.637",
      "affected_versions": "< 8.5.14, < 9.1.8",
      "cpe_vendors": [
        "grafana:grafana"
      ]
    },
    {
      "cve_id": "CVE-2021-41106",
      "cvss_score": 4.4,
      "severity": "MEDIUM",
      "description": "JWT is a library to work with JSON Web Token and JSON Web Signature. Prior to versions 3.4.6, 4.0.4, and 4.1.5, users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\\JWT\\Signer\\Key\\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents. The HMAC hashing functions take any string as input and, since users can issue and validate tokens, users are lead to believe that everything works properly. Vers",
      "published": "2021-09-28T21:15:07.370",
      "affected_versions": "< 3.4.6, < 4.0.4, < 4.1.5",
      "cpe_vendors": [
        "lcobucci:jwt"
      ]
    },
    {
      "cve_id": "CVE-2020-26172",
      "cvss_score": 4.2,
      "severity": "MEDIUM",
      "description": "Every login in tangro Business Workflow before 1.18.1 generates the same JWT token, which allows an attacker to reuse the token when a session is active. The JWT token does not contain an expiration timestamp.",
      "published": "2020-12-18T10:15:12.710",
      "affected_versions": "< 1.18.1",
      "cpe_vendors": [
        "tangro:business_workflow"
      ]
    },
    {
      "cve_id": "CVE-2019-3868",
      "cvss_score": 3.8,
      "severity": "LOW",
      "description": "Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user’s browser session.",
      "published": "2019-04-24T16:29:02.373",
      "affected_versions": "<= 6.0.0",
      "cpe_vendors": [
        "redhat:keycloak"
      ]
    }
  ],
  "search_mode": "keyword",
  "_cached_at": 1778081355.1555667
}