CVE-2026-33996

NameCVE-2026-33996
DescriptionLibJWT is a C JSON Web Token Library. Starting in version 3.0.0 and prior to version 3.3.0, the JWK parsing for RSA-PSS did not protect against a NULL value when expecting to parse JSON string values. A specially crafted JWK file could exploit this behavior by using integers in places where the code expected a string. This was fixed in v3.3.0. A workaround is available. Users importing keys through a JWK file should not do so from untrusted sources. Use the `jwk2key` tool to check for validity of a JWK file. Likewise, if possible, do not use JWK files with RSA-PSS keys.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1132165

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libjwt (PTS)bullseye1.10.2-1+deb11u1fixed
bookworm1.10.2-1+deb12u1fixed
forky, sid, trixie1.17.2-1fixed
libjwt3 (PTS)forky, sid3.2.3-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libjwtsource(unstable)(not affected)
libjwt3source(unstable)(unfixed)1132165

Notes

- libjwt <not-affected> (Only affects the 3.x series)
https://github.com/benmcollins/libjwt/security/advisories/GHSA-ph96-hqpc-9f66
Fixed by: https://github.com/benmcollins/libjwt/commit/cfd890286fa49ae61b534c937c9f0428b5c6034c (v3.3.0)

Search for package or bug name: Reporting problems