SiteShadow
Back to vulnerability library

JWT01 Insecure JWT Handling

What this means

SiteShadow flagged JWT usage that may accept forged or unsafe tokens (examples: decoding without verifying a signature, weak/incorrect algorithms, or missing claim validation like iss, aud, and expiry).

Why it matters

Safer examples

1) Always verify signature + algorithm + key

Use a well-maintained JWT library and verify by default. Avoid "none" and algorithm confusion.

2) Validate claims (issuer, audience, expiry)

// Pseudocode: exact API depends on library
verifyJwt(token, {
  issuer: "https://auth.example.com",
  audience: "siteshadow-api",
  clockToleranceSeconds: 60,
});

3) Keep tokens short-lived and rotate keys

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage