A vulnerability that allows attackers to bypass authentication mechanisms by exploiting weaknesses in JSON Web Token (JWT) implementations.
Implement additional validation and sanitization of JWT claims to ensure their authenticity, integrity, and consistency with the expected values. Furthermore, consider using a secure token store and revoking access tokens when they are no longer valid or have expired.