4 weeks ago 52


This vulnerability has been received by the NVD and has not been analyzed.


In APache APISIX earlier 3.13.1, an attacker tin get a plugin-configured concealed via an mistake connection effect by sending an incorrect JSON Web Token to a way protected by the jwt-auth plugin. The mistake logic successful the dependency room lua-resty-jwt enables sending an RS256 token to an endpoint that requires an HS256 token, with the archetypal concealed worth included successful the mistake response.


CVSS 3.x Severity and Metrics:



Base Score:  N/A

NVD score not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you volition beryllium leaving NIST webspace. We person provided these links to different web sites due to the fact that they may person accusation that would beryllium of involvement to you. No inferences should beryllium drawn connected relationship of different sites being referenced, oregon not, from this page. There whitethorn beryllium different web sites that are much due for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please code comments astir this leafage to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-209 Generation of Error Message Containing Sensitive Information Contributor acceptance level Apache Software Foundation  

Change History

1 alteration records recovered show changes

Read Entire Article