Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-34950 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A flaw in `fast-jwt` allows bypassing the `^` anchor in `publicKeyPemMatcher` via leading spaces in the key string.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Improper input validation in the PEM key matcher regex. πŸ› **Flaw**: The `^` anchor is bypassed by prepending spaces to the public key string.…

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: Nearform. πŸ“¦ **Product**: fast-jwt (JSON Web Token implementation). πŸ“… **Affected Versions**: Version 6.1.0 and all prior versions.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attack**: JWT Algorithm Confusion. πŸ”“ **Impact**: Attackers can forge tokens or bypass authentication. πŸ“Š **Severity**: High Confidentiality (C:H) and High Integrity (I:H) impact. No direct Availability (A:N) loss.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: Low. 🌐 **Network**: Network Accessible (AV:N). πŸ”‘ **Auth**: No Privileges Required (PR:N). πŸ‘€ **User**: No User Interaction Needed (UI:N). πŸ“ˆ **Complexity**: Low (AC:L).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Public Exploit**: No specific PoC provided in the data. πŸ“‚ **Source**: Advisory confirmed via GitHub Security Advisories (GHSA-mvf2-f6gm-w987). ⚠️ **Risk**: Theoretical but highly likely given the low complexity.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Check**: Scan for `fast-jwt` library usage in Node.js projects. πŸ“‹ **Version**: Verify if version is ≀ 6.1.0. πŸ” **Code**: Look for custom PEM key handling that might allow leading whitespace injection.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Upgrade `fast-jwt` to a version > 6.1.0. πŸ“’ **Official**: Patch released via Nearform GitHub Security Advisories. βœ… **Status**: Confirmed fix available.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If upgrading isn't possible, strictly sanitize public key inputs to remove leading/trailing whitespace before passing to the JWT library.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: HIGH. 🚨 **Priority**: Immediate patching recommended. πŸ“‰ **CVSS**: High severity (C:H, I:H). ⏳ **Time**: Vulnerability published April 2026; act now to prevent algorithm confusion attacks.