Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:golang/github.com/dgrijalva/jwt-go/v4@4.0.0-preview1
purl pkg:golang/github.com/dgrijalva/jwt-go/v4@4.0.0-preview1
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-47qq-pxyn-wqge Authorization bypass in github.com/dgrijalva/jwt-go jwt-go allows attackers to bypass intended access restrictions in situations with `[]string{}` for `m["aud"]` (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to [golang-jwt](https://github.com/golang-jwt/jwt) at version 3.2.1 CVE-2020-26160
GHSA-w73w-5m7g-f7qc

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:02:56.874412+00:00 GithubOSV Importer Fixing VCID-47qq-pxyn-wqge https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-w73w-5m7g-f7qc/GHSA-w73w-5m7g-f7qc.json 38.0.0