{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T11:24:07.486","vulnerabilities":[{"cve":{"id":"CVE-2023-48238","sourceIdentifier":"security-advisories@github.com","published":"2023-11-17T22:15:07.817","lastModified":"2024-11-21T08:31:16.830","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"joaquimserafim/json-web-token is a javascript library use to interact with JSON Web Tokens (JWT) which are a compact URL-safe means of representing claims to be transferred between two parties. Affected versions of the json-web-token library are vulnerable to a JWT algorithm confusion attack. On line 86 of the 'index.js' file, the algorithm to use for verifying the signature of the JWT token is taken from the JWT token, which at that point is still unverified and thus shouldn't be trusted. To exploit this vulnerability, an attacker needs to craft a malicious JWT token containing the HS256 algorithm, signed with the public RSA key of the victim application. This attack will only work against this library is the RS256 algorithm is in use, however it is a best practice to use that algorithm."},{"lang":"es","value":"joaquimserafim/json-web-token es una librería de JavaScript que se utiliza para interactuar con JSON Web Tokens (JWT), que son un medio compacto seguro para URL para representar reclamaciones que se transferirán entre dos partes. Las versiones afectadas de la librería json-web-token son vulnerables a un ataque de confusión del algoritmo JWT. En la línea 86 del archivo 'index.js', el algoritmo que se utilizará para verificar la firma del token JWT se toma del token JWT, que en ese momento aún no está verificado y, por lo tanto, no se debe confiar en él. Para explotar esta vulnerabilidad, un atacante necesita crear un token JWT malicioso que contenga el algoritmo HS256, firmado con la clave RSA pública de la aplicación víctima. Este ataque solo funcionará contra esta librería si el algoritmo RS256 está en uso; sin embargo, es una buena práctica utilizar ese algoritmo."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-345"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:joaquimserafim:json_web_token:*:*:*:*:*:node.js:*:*","versionEndExcluding":"3.1.1","matchCriteriaId":"DEA4CF7A-3784-41E7-A801-2283EEEDBF69"}]}]}],"references":[{"url":"https://github.com/joaquimserafim/json-web-token/security/advisories/GHSA-4xw9-cx39-r355","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/joaquimserafim/json-web-token/security/advisories/GHSA-4xw9-cx39-r355","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}}]}