Vulnerability Description
Formbricks is an open source qualtrics alternative. Prior to version 4.0.1, Formbricks is missing JWT signature verification. This vulnerability stems from a token validation routine that only decodes JWTs (jwt.decode) without verifying their signatures. Both the email verification token login path and the password reset server action use the same validator, which does not check the token’s signature, expiration, issuer, or audience. If an attacker learns the victim’s actual user.id, they can craft an arbitrary JWT with an alg: "none" header and use it to authenticate and reset the victim’s password. This issue has been patched in version 4.0.1.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://github.com/formbricks/formbricks/blob/843110b0d6c37b5c0da54291616f84c91c
- https://github.com/formbricks/formbricks/commit/eb1349f205189d5b2d4a95ec42245ca9
- https://github.com/formbricks/formbricks/pull/6596
- https://github.com/formbricks/formbricks/security/advisories/GHSA-7229-q9pv-j6p4
FAQ
What is CVE-2025-59934?
CVE-2025-59934 is a vulnerability with a CVSS score of 9.4 (CRITICAL). Formbricks is an open source qualtrics alternative. Prior to version 4.0.1, Formbricks is missing JWT signature verification. This vulnerability stems from a token validation routine that only decodes...
How severe is CVE-2025-59934?
CVE-2025-59934 has been rated CRITICAL with a CVSS base score of 9.4/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-59934?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.