The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-35042

CVE-2026-35042: fast-jwt Critical Header Vulnerability

CVE-2026-35042 is a critical header parameter validation flaw in fast-jwt that allows improper JWT token acceptance. This article covers the technical details, affected versions, security impact, and mitigation.

Published: April 10, 2026

CVE-2026-35042 Overview

CVE-2026-35042 is a Certificate Validation Bypass vulnerability in fast-jwt, a popular JSON Web Token (JWT) implementation for Node.js. In versions 6.1.0 and earlier, fast-jwt fails to properly validate the crit (Critical) Header Parameter as defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt does not understand, the library incorrectly accepts the token instead of rejecting it, violating the MUST requirement specified in the RFC.

Critical Impact

Applications using fast-jwt may accept maliciously crafted JWT tokens containing unrecognized critical extensions, potentially allowing attackers to bypass security controls or authentication mechanisms that rely on proper JWT validation.

Affected Products

  • fast-jwt versions 6.1.0 and earlier
  • Applications using fast-jwt for JWT validation
  • Node.js services implementing JWT-based authentication with fast-jwt

Discovery Timeline

  • 2026-04-06 - CVE CVE-2026-35042 published to NVD
  • 2026-04-07 - Last updated in NVD database

Technical Details for CVE-2026-35042

Vulnerability Analysis

This vulnerability stems from improper validation of the JWT header's crit parameter. According to RFC 7515 Section 4.1.11, implementations MUST reject JWS tokens that contain critical header parameters they do not understand. The fast-jwt library fails to enforce this requirement, creating a security gap where tokens with unrecognized critical extensions are accepted rather than rejected.

The vulnerability is classified under CWE-345 (Insufficient Verification of Data Authenticity), as the library does not sufficiently verify that the token conforms to the required security specifications before accepting it.

Root Cause

The root cause of CVE-2026-35042 lies in the incomplete implementation of RFC 7515 compliance within fast-jwt. The library's token validation logic does not properly iterate through the crit array in JWT headers to verify that all listed extensions are understood and supported. When encountering unknown extensions in the crit array, the library should reject the token but instead proceeds with acceptance.

Attack Vector

An attacker can exploit this vulnerability by crafting a JWT token with a crit header parameter containing extension names that fast-jwt does not recognize. The attack is network-based and requires no authentication or user interaction. When such a token is submitted to an application using vulnerable versions of fast-jwt, the token will be incorrectly validated as legitimate.

The crit parameter is designed as a security mechanism to ensure that critical security extensions are properly processed. By bypassing this validation, attackers may be able to circumvent security controls that depend on custom JWT extensions, potentially leading to authorization bypass or token forgery scenarios.

For technical details on exploitation, see the GitHub Security Advisory.

Detection Methods for CVE-2026-35042

Indicators of Compromise

  • JWT tokens containing crit header parameters with unusual or unexpected extension names
  • Authentication logs showing accepted tokens with unrecognized critical extensions
  • Anomalous JWT header structures in application access logs

Detection Strategies

  • Implement logging of all JWT crit parameter values at the application layer
  • Monitor for JWT tokens with crit arrays containing non-standard extension names
  • Audit authentication success events for tokens that should have been rejected based on unknown critical extensions
  • Deploy application-layer monitoring to detect unusual JWT header patterns

Monitoring Recommendations

  • Enable verbose logging for JWT validation operations in affected applications
  • Create alerts for authentication events involving JWTs with crit header parameters
  • Review application dependencies regularly for vulnerable fast-jwt versions
  • Implement centralized logging for JWT-related security events across all services

How to Mitigate CVE-2026-35042

Immediate Actions Required

  • Audit all applications and services to identify usage of fast-jwt versions 6.1.0 or earlier
  • Update fast-jwt to the latest patched version that properly validates the crit header parameter
  • Review authentication logs for potential exploitation attempts involving unusual JWT headers
  • Consider implementing additional JWT validation at the application layer as defense-in-depth

Patch Information

Update fast-jwt to a version newer than 6.1.0 that includes the fix for proper crit header validation. Consult the GitHub Security Advisory for specific version information and patch details.

Workarounds

  • Implement custom validation logic to check the crit header parameter before passing tokens to fast-jwt
  • Add application-layer middleware to reject JWTs containing crit arrays with unrecognized extensions
  • Consider switching to an alternative JWT library that properly implements RFC 7515 §4.1.11 until fast-jwt is updated
  • Deploy a reverse proxy or API gateway rule to filter requests containing JWTs with suspicious crit header values
bash
# Example: Check fast-jwt version in your project
npm list fast-jwt

# Update to the latest version
npm update fast-jwt

# Or specify a fixed version in package.json
npm install fast-jwt@latest

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechFast Jwt

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-345
  • Technical References
  • GitHub Security Advisory

  • RFC 7515 Section Analysis
  • Related CVEs
  • CVE-2026-44351: fast-jwt Auth Bypass Vulnerability

  • CVE-2026-35041: fast-jwt DOS Vulnerability

  • CVE-2026-35040: fast-jwt Auth Bypass Vulnerability

  • CVE-2026-35039: fast-jwt Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English