In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).
[
{
"product": "jsonwebtoken node module",
"vendor": "HackerOne",
"versions": [
{
"status": "affected",
"version": "<4.2.2"
}
]
}
]