CVE-2026-25554
Severity CVSS v4.0:
HIGH
Type:
CWE-89
SQL Injection
Publication date:
25/02/2026
Last modified:
15/04/2026
Description
OpenSIPS versions 3.1 before 3.6.4 containing the auth_jwt module (prior to commit 3822d33) contain a SQL injection vulnerability in the jwt_db_authorize() function in modules/auth_jwt/authorize.c when db_mode is enabled and a SQL database backend is used. The function extracts the tag claim from a JWT without prior signature verification and incorporates the unescaped value directly into a SQL query. An attacker can supply a crafted JWT with a malicious tag claim to manipulate the query result and bypass JWT authentication, allowing impersonation of arbitrary identities.
Impact
Base Score 4.0
8.30
Severity 4.0
HIGH
Base Score 3.x
6.50
Severity 3.x
MEDIUM
References to Advisories, Solutions, and Tools
- https://github.com/OpenSIPS/opensips/commit/3822d33c1c6b25832fdd88da1d23eed74be55b05
- https://github.com/OpenSIPS/opensips/pull/3807
- https://opensips.org/
- https://opensips.org/pub/opensips/3.6.4/ChangeLog
- https://www.vulncheck.com/advisories/opensips-auth-jwt-sql-injection-enables-jwt-authentication-bypass



