fix: upgrade go-jose/go-jose/v4 to v4.1.4 to fix JWE decryption DoS vulnerability#719
Merged
michaeljguarino merged 1 commit intomainfrom Apr 4, 2026
Merged
Conversation
…decryption panic vulnerability This update addresses a denial of service vulnerability in Go JOSE where decrypting a JSON Web Encryption (JWE) object can panic if the `alg` field indicates a key wrapping algorithm and the `encrypted_key` field is empty. The panic occurs in cipher.KeyUnwrap() when attempting to allocate a slice with a zero or negative length.
Contributor
Author
There was a problem hiding this comment.
This PR was generated by the claude (engine: claude) agent runtime. Here's some useful information you might want to know to evaluate
the ai's perfomance:
| Name | Details |
|---|---|
| 💬 Prompt | Security scanners have found the following vulnerability in our cluster:... |
| 🔗 Run history | View run history |
michaeljguarino
approved these changes
Apr 4, 2026
plural-copilot bot
pushed a commit
that referenced
this pull request
Apr 11, 2026
Added verification documentation confirming that the go-jose dependency has been properly upgraded from v4.1.3 to v4.1.4, addressing the JWE decryption panic vulnerability. The fix was previously applied in PR #719 (commit 8fe1d0e). This verification confirms: - Dependency is at v4.1.4 in go.mod and go.sum - Code compiles successfully with the updated dependency - Docker build completes without errors Addresses security vulnerability found in Docker image ghcr.io/pluralsh/console:sha-02db129 Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
This PR upgrades the
github.com/go-jose/go-jose/v4dependency from v4.1.3 to v4.1.4 to address a denial of service vulnerability.Vulnerability Details
Impact
Decrypting a JSON Web Encryption (JWE) object can panic if:
algfield indicates a key wrapping algorithm (those ending inKW, exceptA128GCMKW,A192GCMKW, andA256GCMKW)encrypted_keyfield is emptyThe panic occurs when
cipher.KeyUnwrap()attempts to allocate a slice with a zero or negative length based on the length of theencrypted_key. This can lead to denial of service.Changes
go.mod:github.com/go-jose/go-jose/v4v4.1.3 → v4.1.4go.sumwith new checksumsVerification
🤖 Generated with Claude Code