This vulnerability allows attackers to remotely execute code on a server by crafting a malicious JSON web token (JWT) request. However, since it requires several prerequisites to be exploited, it’s not likely that an attacker would use this vulnerability in the wild.