An improper signature verification vulnerability exists when using auth0/node-jws with the HS256 algorithm under specific conditions.
You are affected by this vulnerability if you meet all of the following preconditions:
You are NOT affected by this vulnerability if you meet any of the following preconditions:
1. Application uses the jws.verify() interface (note: auth0/node-jsonwebtoken users fall into this category and are therefore NOT affected by this vulnerability)
2. Application uses only asymmetric algorithms (e.g. RS256)
3. Application doesn’t use user-provided data from the JSON Web Signature Protected Header or Payload in the HMAC secret lookup routines
Upgrade auth0/node-jws version to version 3.2.3 or 4.0.1
Okta would like to thank Félix Charette for discovering this vulnerability.
{
"cwe_ids": [
"CWE-347"
],
"nvd_published_at": "2025-12-04T19:16:05Z",
"github_reviewed_at": "2025-12-04T16:54:15Z",
"severity": "HIGH",
"github_reviewed": true
}