{"id":"CVE-2020-26160","details":"jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m[\"aud\"] (which is allowed by the specification). Because the type assertion fails, \"\" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.","aliases":["GHSA-w73w-5m7g-f7qc","GO-2020-0017"],"modified":"2026-04-10T04:25:22.659034Z","published":"2020-09-30T18:15:27.397Z","related":["CGA-hv4q-5g38-wjr8","SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515","openSUSE-SU-2024:11428-1","openSUSE-SU-2024:11668-1"],"references":[{"type":"ADVISORY","url":"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515"},{"type":"FIX","url":"https://github.com/dgrijalva/jwt-go/pull/426"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dgrijalva/jwt-go","events":[{"introduced":"0"},{"last_affected":"06ea1031745cb8b3dab3f6a236daf2b0aa468b7e"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.2.0"}]}}],"versions":["v1.0.0","v1.0.1","v2.0.0","v2.1.0","v2.2.0","v2.3.0","v2.4.0","v2.5.0","v2.6.0","v2.7.0","v3.0.0","v3.1.0","v3.2.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-26160.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}