Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.typelevel/jawn-parser_2.12
  4. ›
  5. CVE-2022-21653

CVE-2022-21653: Hash collision in typelevel jawn

January 6, 2022 (updated December 16, 2025)

Extenders of the org.typelevel.jawn.SimpleFacade and org.typelevel.jawn.MutableFacade who don’t override objectContext() are vulnerable to a hash collision attack. Most applications do not implement these traits directly, but inherit from a library:

Affected implementations include:

  • org.http4s :: http4s-play-json
  • org.typelevel :: jawn-ast (< 0.8.0)
  • org.typelevel :: jawn-play (discontinued)
  • org.typelevel :: jawn-rojoma (discontinued)
  • org.typelevel :: jawn-spray (discontinued)

Unaffected implementations include:

  • io.argonaut :: argonaut-jawn
  • io.circe :: circe-parser
  • org.typelevel :: jawn-ast (>= 0.8.0)
  • org.typelevel :: jawn-json4s (discontinued)
  • org.typelevel :: jawn-argonaut (discontinued)

References

  • github.com/advisories/GHSA-vc89-hccf-rq55
  • github.com/typelevel/jawn
  • github.com/typelevel/jawn/pull/390
  • github.com/typelevel/jawn/security/advisories/GHSA-vc89-hccf-rq55
  • nvd.nist.gov/vuln/detail/CVE-2022-21653

Code Behaviors & Features

Detect and mitigate CVE-2022-21653 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.3.2

Fixed versions

  • 1.3.2

Solution

Upgrade to version 1.3.2 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-326: Inadequate Encryption Strength
  • CWE-400: Uncontrolled Resource Consumption

Source file

maven/org.typelevel/jawn-parser_2.12/CVE-2022-21653.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 05 Feb 2026 00:17:44 +0000.