๐Ÿ” CVE Alert

CVE-2026-25554

MEDIUM 6.5

OpenSIPS 3.1 <= 3.6.4 auth_jwt SQL Injection Enables JWT Authentication Bypass

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

OpenSIPS versions 3.1 before 3.6.4 containing the auth_jwt module (prior to commit 3822d33) contain a SQL injection vulnerability in the jwt_db_authorize() function in modules/auth_jwt/authorize.c when db_mode is enabled and a SQL database backend is used. The function extracts the tag claim from a JWT without prior signature verification and incorporates the unescaped value directly into a SQL query. An attacker can supply a crafted JWT with a malicious tag claim to manipulate the query result and bypass JWT authentication, allowing impersonation of arbitrary identities.

CWE CWE-89
Vendor opensips
Product opensips
Published Feb 25, 2026
Last Updated Mar 5, 2026
Stay Ahead of the Next One

Get instant alerts for opensips opensips

Be the first to know when new medium vulnerabilities affecting opensips opensips are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None

Affected Versions

OpenSIPS / OpenSIPS
3.1 < 3.6.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
opensips.org: https://opensips.org/pub/opensips/3.6.4/ChangeLog github.com: https://github.com/OpenSIPS/opensips/pull/3807 github.com: https://github.com/OpenSIPS/opensips/commit/3822d33c1c6b25832fdd88da1d23eed74be55b05 opensips.org: https://opensips.org/ vulncheck.com: https://www.vulncheck.com/advisories/opensips-auth-jwt-sql-injection-enables-jwt-authentication-bypass

Credits

Pavel Kohout, Aisle Research, www.aisle.com