The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-44351

CVE-2026-44351: fast-jwt Auth Bypass Vulnerability

CVE-2026-44351 is an authentication bypass vulnerability in fast-jwt that lets attackers forge arbitrary JWTs accepted as authentic. This post covers the technical details, affected versions, impact, and mitigation.

Published: May 14, 2026

CVE-2026-44351 Overview

CVE-2026-44351 is an authentication bypass vulnerability in fast-jwt, a high-performance JSON Web Token (JWT) implementation for Node.js. Versions prior to 6.2.4 accept forged tokens when the async key resolver returns an empty string. Unauthenticated attackers can craft arbitrary JWT payloads — including elevated sub, admin, or scopes claims — that the library validates as authentic. The flaw is classified under CWE-287: Improper Authentication and is fixed in version 6.2.4.

Critical Impact

Any unauthenticated attacker can forge valid JWTs and impersonate any user when the application uses a JWKS-style fallback that returns an empty key.

Affected Products

  • fast-jwt versions prior to 6.2.4
  • Node.js applications using fast-jwt with an async key resolver
  • Services implementing JWKS-style fallbacks such as keys[decoded.header.kid] || ''

Discovery Timeline

  • 2026-05-13 - CVE-2026-44351 published to NVD
  • 2026-05-13 - Last updated in NVD database

Technical Details for CVE-2026-44351

Vulnerability Analysis

The vulnerability resides in fast-jwt's async key-resolver flow. When the resolver returns an empty string, the library converts it to a zero-length Buffer and passes it to crypto.createSecretKey. The library then derives allowedAlgorithms = ['HS256','HS384','HS512'] from the empty secret and proceeds to verify the token signature using HMAC with that empty key.

Node.js does not reject empty-key HMAC operations. An attacker who computes HMAC-SHA256(key='', input='${header}.${payload}') produces a signature that the verifier accepts. The library then returns the attacker-controlled payload to the application as authenticated identity data.

This impacts confidentiality and integrity directly. Applications relying on JWT claims for authorization will grant any privilege the attacker chooses to encode.

Root Cause

The root cause is missing validation of the secret key length and missing constraint of allowedAlgorithms when the resolver returns a falsy or empty value. The common pattern keys[decoded.header.kid] || '' — used to look up signing keys by JWKS key ID — triggers the bypass whenever an attacker supplies an unknown kid in the JWT header. The fallback empty string flows through key construction without any sanity check.

Attack Vector

The attack requires only network access to the JWT-accepting endpoint. An attacker performs the following steps:

  1. Construct a JWT header specifying alg: HS256 and an unknown kid.
  2. Construct an arbitrary payload with desired claims such as sub, admin, or scopes.
  3. Compute the HMAC-SHA256 of base64url(header).base64url(payload) using an empty string as the key.
  4. Submit the resulting token to the target application.

The key resolver returns '' for the unknown kid, fast-jwt validates the empty-key HMAC signature successfully, and the application treats the forged payload as authentic. See the GitHub Security Advisory GHSA-gmvf-9v4p-v8jc for additional technical details.

Detection Methods for CVE-2026-44351

Indicators of Compromise

  • JWTs presented to the application containing a kid header value that does not correspond to any configured signing key.
  • Successful authentication events tied to JWTs whose signatures verify against an empty secret.
  • Authentication logs showing privilege-elevated sessions without a corresponding password or MFA event.
  • Inbound requests with JWTs using alg: HS256 when the application expects asymmetric algorithms such as RS256 or ES256.

Detection Strategies

  • Inventory all Node.js services that depend on fast-jwt and compare installed versions against the fixed release 6.2.4.
  • Add server-side logging that records the kid and alg of every received JWT, then alert on unknown kid values.
  • Implement runtime checks that reject any decoded secret with zero length before signature verification.
  • Review application code for the pattern keys[decoded.header.kid] || '' or equivalent fallbacks returning empty strings, null, or undefined.

Monitoring Recommendations

  • Forward authentication and API gateway logs to a centralized analytics platform and correlate JWT verification events with downstream privilege use.
  • Alert on first-seen kid values across production traffic to catch enumeration attempts.
  • Monitor for sudden increases in administrative actions or scope-elevated API calls from previously unseen sessions.

How to Mitigate CVE-2026-44351

Immediate Actions Required

  • Upgrade fast-jwt to version 6.2.4 or later across all Node.js services.
  • Audit key resolver functions to ensure they throw or return an error when no key matches the requested kid, rather than returning an empty string.
  • Pin the accepted algorithms explicitly using the allowedAlgorithms option and exclude HMAC algorithms when verifying tokens signed with asymmetric keys.
  • Rotate any signing keys and invalidate active sessions issued during the exposure window.

Patch Information

The maintainers fixed the issue in fast-jwt version 6.2.4. The patch rejects empty or zero-length secrets during key construction and prevents derivation of HMAC algorithms from an empty buffer. Update via npm install fast-jwt@^6.2.4 or the equivalent command for your package manager. Full advisory details are available in the GitHub Security Advisory GHSA-gmvf-9v4p-v8jc.

Workarounds

  • Replace fallback patterns like keys[decoded.header.kid] || '' with explicit error handling that rejects the token when the kid is unknown.
  • Configure the verifier with an explicit allowedAlgorithms list matching only the algorithms your issuer uses, such as ['RS256'].
  • Add a pre-verification middleware that rejects any JWT whose resolved key buffer has length zero.
bash
# Upgrade fast-jwt to the patched version
npm install fast-jwt@^6.2.4

# Verify installed version
npm ls fast-jwt

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechFast Jwt

  • SeverityCRITICAL

  • CVSS Score9.1

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-287
  • Technical References
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-35040: fast-jwt Auth Bypass Vulnerability

  • CVE-2026-35039: fast-jwt Auth Bypass Vulnerability

  • CVE-2026-34950: fast-jwt Auth Bypass Vulnerability

  • CVE-2026-35041: fast-jwt DOS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English