Skip to content

[3.3] Backport CVE-2026-25554: Fix SQL injection in auth_jwt module via unescaped tag claim (#3807)#3873

Open
vulgraph wants to merge 1 commit intoOpenSIPS:3.3from
vulgraph:backport/CVE-2026-25554-3.3
Open

[3.3] Backport CVE-2026-25554: Fix SQL injection in auth_jwt module via unescaped tag claim (#3807)#3873
vulgraph wants to merge 1 commit intoOpenSIPS:3.3from
vulgraph:backport/CVE-2026-25554-3.3

Conversation

@vulgraph
Copy link
Copy Markdown

Backport of upstream fix for CVE-2026-25554 to 3.3.

Apply was clean against the current tip of the target branch. No code changes on top of the upstream fix.

…S#3807)

The jwt_db_authorize() function...
The jwt_db_authorize() function in the auth_jwt module decodes JWT tokens
without signature verification to extract the 'tag' claim, then interpolates
this claim directly into a raw SQL query without escaping. An attacker can
craft a malicious JWT with SQL injection payload in the tag claim (e.g.,
"' UNION SELECT 'admin','attacker_secret' --") to inject their own secret
into the query result. Since the injected secret is then used to verify the
JWT signature, the attacker can sign their token with this known secret and
achieve authentication bypass.

Reported-by: Pavel Kohout, Aisle Research, www.aisle.com
(cherry picked from commit 3822d33)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants