Improper Validation of Integrity Check Value Affecting jwe package, versions <1.1.1


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUBY-JWE-11520806
  • published8 Aug 2025
  • disclosed7 Aug 2025
  • creditSideni

Introduced: 7 Aug 2025

NewCVE-2025-54887  (opens in a new tab)
CWE-354  (opens in a new tab)

How to fix?

Upgrade jwe to version 1.1.1 or higher.

Overview

jwe is a Ruby implementation of the RFC 7516 JSON Web Encryption (JWE) standard.

Affected versions of this package are vulnerable to Improper Validation of Integrity Check Value due to missing authentication tag validation in the AES-GCM process. An attacker can gain access to confidential information and manipulate encrypted data by brute-forcing the authentication tag or crafting arbitrary encrypted objects.

References

CVSS Base Scores

version 4.0
version 3.1