MEDIUM
JWT Forgery
20
points
The application uses a weak JWT implementation. Exploit the 'none' algorithm vulnerability to forge an admin token and access restricted endpoints.
20
points
The application uses a weak JWT implementation. Exploit the 'none' algorithm vulnerability to forge an admin token and access restricted endpoints.