Report: Update: CVE-2026-33996 - LibJWT has NULL/bounds validation in JWK octet and RSA PSS parsing

Report: Update: CVE-2026-33996 - LibJWT has NULL/bounds validation in JWK octet and RSA PSS parsing

CVE ID :CVE-2026-33996 Published : March 27, 2026, 11:17 p.m. | 37 minutes ago Description :LibJWT is a C JSON Web Token Library. Starting in version 3.0.0 and prior to version 3.3.0, the JWK parsing for RSA-PSS did not protect against a NULL value when expecting to parse JSON string values. A specially crafted JWK file could exploit this behavior by using integers in places where the code expected a string. This was fixed in v3.3.0. A workaround is available. Users importing keys through a JWK file should not do so from untrusted sources. Use the `jwk2key` tool to check for validity of a JWK file. Likewise, if possible, do not use JWK files with RSA-PSS keys. Severity: 5.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
MEDIUM
Published
March 27, 2026