jwt-go allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to golang-jwt at version 3.2.1
{
"github_reviewed": true,
"cwe_ids": [
"CWE-287",
"CWE-755"
],
"nvd_published_at": "2020-09-30T18:15:00Z",
"severity": "HIGH",
"github_reviewed_at": "2021-05-18T20:54:59Z"
}