The authentication tag of encrypted JWEs can be brute forced, which may result in loss of confidentiality for those JWEs and provide ways to craft arbitrary JWEs.
You are affected by this vulnerability even if you do not use an AES-GCM
encryption algorithm for your JWEs.
The version 1.1.1 fixes the issue by adding the tag length check for the AES-GCM
algorithm.
Important: As the GHASH key could have leaked, you must rotate the encryption keys after upgrading to version 1.1.1.
{ "nvd_published_at": "2025-08-08T01:15:25Z", "github_reviewed": true, "github_reviewed_at": "2025-08-07T20:55:35Z", "severity": "CRITICAL", "cwe_ids": [ "CWE-354" ] }