{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T11:46:52.997","vulnerabilities":[{"cve":{"id":"CVE-2018-1000125","sourceIdentifier":"cve@mitre.org","published":"2018-03-13T21:29:00.367","lastModified":"2024-11-21T03:39:44.150","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"inversoft prime-jwt version prior to version 1.3.0 or prior to commit 0d94dcef0133d699f21d217e922564adbb83a227 contains an input validation vulnerability in JWTDecoder.decode that can result in a JWT that is decoded and thus implicitly validated even if it lacks a valid signature. This attack appear to be exploitable via an attacker crafting a token with a valid header and body and then requests it to be validated. This vulnerability appears to have been fixed in 1.3.0 and later or after commit 0d94dcef0133d699f21d217e922564adbb83a227."},{"lang":"es","value":"inversoft prime-jwt, en versiones anteriores a la 1.3.0 o al commit con ID 0d94dcef0133d699f21d217e922564adbb83a227, contiene una vulnerabilidad de validación de entradas en JWTDecoder.decode que puede resultar en un JWT que se descifra y, por lo tanto, se valida implícitamente incluso aunque carezca de una firma válida. El ataque parece ser explotable mediante un atacante que manipule un token con una cabecera y un cuerpo válidos y que solicite que se valide. La vulnerabilidad parece haber sido solucionada en la versión 1.3.0 y siguientes o tras el commit con ID 0d94dcef0133d699f21d217e922564adbb83a227."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:inversoft:prime-jwt:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.0","matchCriteriaId":"E3D29334-A4EA-4FFD-8769-AC62DFEB5091"}]}]}],"references":[{"url":"https://github.com/inversoft/prime-jwt/blob/master/CHANGES","source":"cve@mitre.org","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/inversoft/prime-jwt/issues/2","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://github.com/inversoft/prime-jwt/blob/master/CHANGES","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/inversoft/prime-jwt/issues/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}