Authentication Bypass in Fast-JWT by NearForm
CVE-2026-44351

9.1CRITICAL

Key Information:

Vendor

Nearform

Status
Vendor
CVE Published:
13 May 2026

What is CVE-2026-44351?

Fast-jwt, a library providing a lightweight implementation of JSON Web Tokens (JWTs), has a vulnerability in its async key-resolver flow prior to version 6.2.4. This flaw allows unauthenticated attackers to forge arbitrary JWTs, which are then accepted as valid by the application. The issue arises when the key resolver returns an empty string, leading to the generation of a zero-length Buffer used in the HMAC signing process. An attacker is able to compute a signature that the application verifies successfully, thereby gaining illegitimate access by crafting a token with malicious payloads. Version 6.2.4 addresses this significant security concern.

Affected Version(s)

fast-jwt < 6.2.4

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.