{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T23:53:39.324","vulnerabilities":[{"cve":{"id":"CVE-2025-22149","sourceIdentifier":"security-advisories@github.com","published":"2025-01-09T18:15:30.233","lastModified":"2025-05-23T20:15:24.427","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"JWK Set (JSON Web Key Set) is a JWK and JWK Set Go implementation. Prior to 0.6.0, the project's provided HTTP client's local JWK Set cache should do a full replacement when the goroutine refreshes the remote JWK Set. The current behavior is to overwrite or append. This is a security issue for use cases that utilize the provided auto-caching HTTP client and where key removal from a JWK Set is equivalent to revocation. The affected auto-caching HTTP client was added in version v0.5.0 and fixed in v0.6.0. The only workaround would be to remove the provided auto-caching HTTP client and replace it with a custom implementation. This involves setting the HTTPClientStorageOptions.RefreshInterval to zero (or not specifying the value)."},{"lang":"es","value":"JWK Set (JSON Web Key Set) es una implementación de JWK y JWK Set Go. Antes de la versión 0.6.0, la caché local de JWK Set del cliente HTTP proporcionado por el proyecto debería realizar un reemplazo completo cuando la goroutine actualiza el JWK Set remoto. El comportamiento actual es sobrescribir o agregar. Este es un problema de seguridad para los casos de uso que utilizan el cliente HTTP de almacenamiento en caché automático proporcionado y donde la eliminación de claves de un JWK Set es equivalente a la revocación. El cliente HTTP de almacenamiento en caché automático afectado se agregó en la versión v0.5.0 y se solucionó en la v0.6.0. El único workaround sería eliminar el cliente HTTP de almacenamiento en caché automático proporcionado y reemplazarlo con una implementación personalizada. Esto implica configurar HTTPClientStorageOptions.RefreshInterval en cero (o no especificar el valor)."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0\/AV:N\/AC:H\/AT:P\/PR:H\/UI:N\/VC:N\/VI:N\/VA:N\/SC:N\/SI:L\/SA:N\/E:X\/CR:X\/IR:X\/AR:X\/MAV:X\/MAC:X\/MAT:X\/MPR:X\/MUI:X\/MVC:X\/MVI:X\/MVA:X\/MSC:X\/MSI:X\/MSA:X\/S:X\/AU:X\/R:X\/V:X\/RE:X\/U:X","baseScore":2.1,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"LOW","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-672"}]}],"references":[{"url":"https:\/\/github.com\/MicahParks\/jwkset\/commit\/01db49a90f7f20c7fb39a699a2f19a7a5f379ed3","source":"security-advisories@github.com"},{"url":"https:\/\/github.com\/MicahParks\/jwkset\/issues\/40","source":"security-advisories@github.com"},{"url":"https:\/\/github.com\/MicahParks\/jwkset\/security\/advisories\/GHSA-675f-rq2r-jw82","source":"security-advisories@github.com"},{"url":"https:\/\/www.vicarius.io\/vsociety\/posts\/cve-2025-22149-detect-jwkset-vulnerability-in-go-projects-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/www.vicarius.io\/vsociety\/posts\/cve-2025-22149-mitigate-jwkset-vulnerability-in-go-projects","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}