GHSA-9mj6-hxhv-w67j

Suggest an improvement
Source
https://github.com/advisories/GHSA-9mj6-hxhv-w67j
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/11/GHSA-9mj6-hxhv-w67j/GHSA-9mj6-hxhv-w67j.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-9mj6-hxhv-w67j
Aliases
Downstream
Related
Published
2025-11-12T18:31:25Z
Modified
2025-11-18T16:12:36.875191Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
jose2go is vulnerable to a JWT bomb attack through its decode function
Details

An issue was discovered in dvsekhvalnov jose2go 1.5.0 thru 1.7.0 allowing an attacker to cause a Denial-of-Service (DoS) via crafted JSON Web Encryption (JWE) token with an exceptionally high compression ratio.

Database specific
{
    "severity": "HIGH",
    "cwe_ids": [
        "CWE-400"
    ],
    "nvd_published_at": "2025-11-12T18:15:35Z",
    "github_reviewed_at": "2025-11-14T21:44:36Z",
    "github_reviewed": true
}
References

Affected packages

Go / github.com/dvsekhvalnov/jose2go

Package

Name
github.com/dvsekhvalnov/jose2go
View open source insights on deps.dev
Purl
pkg:golang/github.com/dvsekhvalnov/jose2go

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.0