Jervis Has a JWT Algorithm Confusion Vulnerability
Moderate severity
GitHub Reviewed
Published
Jan 13, 2026
in
samrocketman/jervis
•
Updated Jan 21, 2026
Description
Published to the GitHub Advisory Database
Jan 13, 2026
Reviewed
Jan 13, 2026
Published by the National Vulnerability Database
Jan 13, 2026
Last updated
Jan 21, 2026
Vulnerability
https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1d8ee2254950fd2231de2b05/src/main/groovy/net/gleske/jervis/tools/SecurityIO.groovy#L244-L249
The code doesn't validate that the JWT header specifies
"alg":"RS256".Impact
Depending on the broader system, this could allow JWT forgery.
Internally this severity is low since JWT is only intended to interface with GitHub. External users should consider severity moderate.
Patches
Jervis patch will explicitly verify the algorithm in the header matches expectations and further verify the JWT structure.
Upgrade to Jervis 2.2.
Workarounds
External users should consider using an alternate JWT library or upgrade.
References
References