๐Ÿ” CVE Alert

CVE-2026-44351

CRITICAL 9.1

fast-jwt: Empty HMAC secret accepted via async key resolver - JWT auth bypass

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th

fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 6.2.4, a critical authentication-bypass vulnerability in fast-jwt's async key-resolver flow allows any unauthenticated attacker to forge arbitrary JWTs that are accepted as authentic. When the application's key resolver returns an empty string (''), for example via the common keys[decoded.header.kid] || '' JWKS-style fallback, fast-jwt converts it to a zero-length Buffer, hands it to crypto.createSecretKey, derives allowedAlgorithms = ['HS256','HS384','HS512'] from it, and then verifies the token's signature against an empty-key HMAC. The attacker simply computes HMAC-SHA256(key='', input='${header}.${payload}'), which Node accepts without complaint โ€” and the verifier returns the attacker-chosen payload (sub, admin, scopes, etc.) as authentic. This vulnerability is fixed in 6.2.4.

CWE CWE-287 CWE-326 CWE-1391
Vendor nearform
Product fast-jwt
Published May 13, 2026
Stay Ahead of the Next One

Get instant alerts for nearform fast-jwt

Be the first to know when new critical vulnerabilities affecting nearform fast-jwt are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

nearform / fast-jwt
< 6.2.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/nearform/fast-jwt/security/advisories/GHSA-gmvf-9v4p-v8jc