CVE-2025-59934
BaseFortify
Publication date: 2025-09-26
Last updated on: 2025-09-29
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| formbricks | formbricks | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
| CWE-345 | The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data. |
| CWE-347 | The product does not verify, or incorrectly verifies, the cryptographic signature for data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Formbricks prior to version 4.0.1 involves missing JWT signature verification. The token validation routine only decodes JWTs without verifying their signatures, expiration, issuer, or audience. An attacker who knows a victim's user ID can craft a JWT with an 'alg: none' header to bypass authentication and reset the victim's password.
How can this vulnerability impact me? :
An attacker can exploit this vulnerability to authenticate as a victim and reset their password without proper authorization. This can lead to unauthorized access to user accounts, compromising confidentiality, integrity, and availability of user data.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Formbricks to version 4.0.1 or later, as this version includes a patch that properly verifies JWT signatures and addresses the vulnerability.