fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hm7r-c7qw-ghp6 | fast-jwt accepts unknown `crit` header extensions (RFC 7515 violation) |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 06 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. | |
| Title | fast-jwt accepts unknown `crit` header extensions (RFC 7515 §4.1.11 MUST violation) | |
| Weaknesses | CWE-345 CWE-636 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T17:02:12.180Z
Reserved: 2026-03-31T21:06:06.428Z
Link: CVE-2026-35042
No data.
Status : Received
Published: 2026-04-06T17:17:13.410
Modified: 2026-04-06T17:17:13.410
Link: CVE-2026-35042
No data.
OpenCVE Enrichment
No data.
Github GHSA