Open Closed

System.IdentityModel.Tokens.Jwt 6.26.1 has a known high severity vulnerability #10541


User avatar
0
DominaTang created

The top-level package is Volo.Abp.Http.Client.IdentityModel 10.1.1, which pulls in Volo.Abp.IdentityModel, which in turn depends on Microsoft.IdentityModel.* 6.26.1 and System.IdentityModel.Tokens.Jwt 6.26.1.

Can ABP package upgrade to System.IdentityModel.Tokens.Jwt version 8?


3 Answer(s)
  • User Avatar
    0
    AI-Bot created
    Support Team ABP Agent
    • ABP 10.1.1 cannot simply “upgrade to Jwt v8” as a drop-in change, because ABP versions are tied to a tested dependency set and Microsoft.IdentityModel/System.IdentityModel.Tokens.Jwt 8.x is a major-version jump that can introduce breaking changes across the IdentityModel stack.
    • What ABP has already done (officially) is upgrade away from the old 6.x line: starting with ABP 8.2, ABP upgraded:
      • System.IdentityModel.Tokens.Jwt to 7.5.1
      • Microsoft.IdentityModel.* packages to 7.5.1
    • So the actionable, ABP-supported path to address the reported vulnerability in System.IdentityModel.Tokens.Jwt 6.26.1 is to upgrade your ABP solution to a version that includes these upgraded dependencies (at least ABP 8.2+, and in practice you should move to the latest ABP version in your major line).

    If you’re staying on ABP 10.1.1 specifically, there is no verified ABP source stating that ABP 10.1.x supports System.IdentityModel.Tokens.Jwt 8.x via its own packages. The verified ABP guidance available shows the framework moving to 7.5.1 (not 8.x) as part of its dependency upgrades.

    Links (verified):

    • https://abp.io/docs/latest/release-info/migration-guides/abp-8-2#upgraded-nuget-dependencies

    This response was generated by AI. If it didn’t solve your problem, feel free to post a new answer — our support team will jump in to help you soon.

  • User Avatar
    0
    DominaTang created

    My bad, it is introduce by Microsoft.Graph 4.54.0 that the application use. There is another vulnerable package Volo.Abp.TextTemplating.Scriban 10.1.1 it depends on Scriban 6.3.0 which has high-severity vulnerabilities.

  • User Avatar
    0
    Belen.molinaMA created

    Hello ABP Team,

    We are currently working on an ABP-based solution (ABP v10.x) and during package restore/build we are receiving NuGet security warnings related to a transitive dependency on Scriban 6.3.0, which reports multiple vulnerabilities (including high severity GHSA advisories).

    From our analysis, Scriban is being brought transitively through ABP packages related to Text Templating (used for email templates and notifications), not from a direct package reference in our solution.

    The issue is that NuGet audit warnings (NU1901–NU1904) are being treated as errors in our environment, which blocks restore, build, and EF Core migrations unless we explicitly suppress these warnings or lower the audit level.

    Our questions are:

    Is ABP planning to update the Scriban dependency to a non-vulnerable version in an upcoming release? Is it safe to override the Scriban version at the solution level, or could this break ABP Text Templating functionality? What is the recommended approach from the ABP team for handling NU190x vulnerability warnings caused by transitive dependencies used internally by ABP? Is there an official mitigation strategy recommended by ABP for production environments where email templating is used?

    At the moment, as a temporary workaround, we are considering configuring:

    WarningsNotAsErrors for NU1901–NU1904 NuGetAuditLevel=critical

    But we would like to confirm the officially recommended approach from the ABP team before proceeding.

Boost Your Development
ABP Live Training
Packages
See Trainings
Mastering ABP Framework Book
The Official Guide
Mastering
ABP Framework
Learn More
Mastering ABP Framework Book
Made with ❤️ on ABP v10.3.0-preview. Updated on March 13, 2026, 12:51
1
ABP Assistant
🔐 You need to be logged in to use the chatbot. Please log in first.