HIGH rate limiting bypassjwt tokens
Rate Limiting Bypass with Jwt Tokens
How Rate Limiting Bypass Manifests in Jwt Tokens
Rate limiting bypass vulnerabilities in JWT tokens exploit the stateless nature of JWT authentication to circumvent per-user request limits. Attackers can manipulate token claims, reuse tokens across different user contexts, or exploit timing issues to exceed intended rate limits.
The most common JWT rate limiting bypass occurs through token manipulation. Since JWT tokens are self-contained and signed, systems often trust the claims within them without proper validation. An attacker can modify the iat (issued at) or exp (expiration) claims to create tokens that appear valid from different time periods, effectively resetting rate limit counters.
Related CWEs: resourceConsumption
CWE ID Name Severity CWE-400 Uncontrolled Resource Consumption HIGH CWE-770 Allocation of Resources Without Limits MEDIUM CWE-799 Improper Control of Interaction Frequency MEDIUM CWE-835 Infinite Loop HIGH CWE-1050 Excessive Platform Resource Consumption MEDIUM