Advisory Database
  • Advisories
  • Dependency Scanning
  1. swift
  2. ›
  3. github.com/beatt83/jose-swift
  4. ›
  5. GHSA-88q6-jcjg-hvmw

GHSA-88q6-jcjg-hvmw: jose-swift has JWT Signature Verification Bypass via None Algorithm

January 9, 2026 (updated March 25, 2026)

An authentication bypass vulnerability allows any unauthenticated attacker to forge arbitrary JWT tokens by setting “alg”: “none” in the token header. The library’s verification functions immediately return true for such tokens without performing any cryptographic verification, enabling complete impersonation of any user and privilege escalation.

References

  • github.com/advisories/GHSA-88q6-jcjg-hvmw
  • github.com/beatt83/jose-swift
  • github.com/beatt83/jose-swift/commit/13e5ae6f23ef1487b0dad72540eff414272bd7ca
  • github.com/beatt83/jose-swift/pull/62
  • github.com/beatt83/jose-swift/releases/tag/6.0.2
  • github.com/beatt83/jose-swift/security/advisories/GHSA-88q6-jcjg-hvmw

Detect and mitigate GHSA-88q6-jcjg-hvmw with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 6.0.2

Fixed versions

  • 6.0.2

Solution

Upgrade to version 6.0.2 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-327: Use of a Broken or Risky Cryptographic Algorithm

Source file

swift/github.com/beatt83/jose-swift/GHSA-88q6-jcjg-hvmw.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:28 +0000.