{"id":"CVE-2018-1000531","details":"inversoft prime-jwt version prior to commit abb0d479389a2509f939452a6767dc424bb5e6ba contains a CWE-20 vulnerability in JWTDecoder.decode that can result in an incorrect signature validation of a JWT token. This attack can be exploitable when an attacker crafts a JWT token with a valid header using 'none' as algorithm and a body to requests it be validated. This vulnerability was fixed after commit abb0d479389a2509f939452a6767dc424bb5e6ba.","modified":"2026-03-14T09:25:45.774467Z","published":"2018-06-26T16:29:01.807Z","references":[{"type":"ADVISORY","url":"https://github.com/inversoft/prime-jwt/issues/3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ws-apps/prime-jwt","events":[{"introduced":"0"},{"last_affected":"8011cd2a8eb64dd338fddf88e0e855b2a6b734e7"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.3.0"}]}}],"versions":["0.1.0","0.1.1","0.1.2","0.1.3","0.1.4","0.1.5","0.1.6","0.2.0","0.2.1","1.0.0","1.1.0","1.2.0","1.2.1","1.3.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1000531.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}