Access of Resource Using Incompatible Type ('Type Confusion') Affecting jsonwebtoken package, versions <10.3.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.09% (25th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access of Resource Using Incompatible Type ('Type Confusion') vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-JSONWEBTOKEN-15189005
  • published3 Feb 2026
  • disclosed3 Feb 2026
  • creditKrishna Agarwal

Introduced: 3 Feb 2026

CVE-2026-25537  (opens in a new tab)
CWE-843  (opens in a new tab)

How to fix?

Upgrade jsonwebtoken to version 10.3.0 or higher.

Overview

Affected versions of this package are vulnerable to Access of Resource Using Incompatible Type ('Type Confusion') via the claim validation logic. An attacker can bypass time-based access restrictions by providing claims such as nbf or exp with incorrect JSON types, causing the validation logic to skip checks and grant unauthorized access.

Note: This is only exploitable if validation flags (like validate_nbf or validate_exp) are enabled without adding the respective claims to the required claims list.

References

CVSS Base Scores

version 4.0
version 3.1