Fast JSON Web Token implementation
93%
Total Score
63
100
100
100
100
| Title | Versions | Severity |
|---|---|---|
CVE-2026-44351 fast-jwt is vulnerable to Improper Authentication in versions 0.0.0 - 6.2.3. | 0.0.0 - 6.2.3 | Critical |
AIKIDO-2026-10699 fast-jwt is vulnerable to Authentication Bypass in versions 0.1.0 - 6.2.3. | 0.1.0 - 6.2.3 | Critical |
AIKIDO-2026-10698 Pre-CVE Found by Aikido Intel before public disclosure or CVE publication. fast-jwt is vulnerable to Improper Input Validation in versions 0.1.0 - 6.2.2. | 0.1.0 - 6.2.2 | Low |
CVE-2026-35041 fast-jwt is vulnerable to Inefficient Regular Expression Complexity in versions 5.0.0 - 6.2.0. | 5.0.0 - 6.2.0 | Medium |
CVE-2026-35040 fast-jwt is vulnerable to Expected Behavior Violation in versions 0.0.0 - 6.2.1. | 0.0.0 - 6.2.1 | Medium |
| Dependency | Last Release | Score |
|---|---|---|
asn1.js Version ^5.4.1 | — | — |
mnemonist Version ^0.40.0 | — | — |
@lukeed/ms Version ^2.0.2 | — | — |
safe-regex2 Version ^5.1.0 | — | — |
ecdsa-sig-formatter Version ^1.0.11 | — | — |
Connect your repositories to instantly see whether vulnerable or malicious packages exist in your codebase.
Free. No credit card required.

SOC 2Compliant
ISO 27001Compliant