Memory Consumption Issue in Go JOSE Affects JSON Security Standards
CVE-2025-27144

6.6MEDIUM

Key Information:

Vendor

Go-jose

Status
Vendor
CVE Published:
24 February 2025

What is CVE-2025-27144?

Go JOSE, an implementation of the Javascript Object Signing and Encryption standards, is impacted by a vulnerability wherein parsing certain compact JWS or JWE tokens can lead to excessive memory consumption. This vulnerability arises from the method used to split JWT tokens, particularly when processing maliciously crafted tokens that contain an unusually high number of period (.) characters. Attackers can leverage this flaw to exhaust memory resources, potentially leading to Denial of Service conditions. Version 4.0.5 of Go JOSE resolves this issue, and a recommended workaround involves validating token payloads to ensure they do not contain excessive periods.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

go-jose >= 4.0.0, < 4.0.5

References

CVSS V4

Score:
6.6
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.