The Data Sharing Framework (DSF) implements a distributed process engine based on the BPMN 2.0 and FHIR R4 standards. Prior to 2.1.0, The OIDC JWKS and Metadata Document caches used an inverted time comparison (isBefore instead of isAfter), causing the cache to never return cached values. Every incoming request triggered a fresh HTTP fetch of the OIDC Metadata Document and JWKS keys from the OIDC provider. The OIDC token cache for the FHIR client connections used an inverted time comparison (isBefore instead of isAfter), causing the cache to never invalidate. Every incoming request returned the same OIDC token even if expired. This vulnerability is fixed in 2.1.0.
History

Wed, 22 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Datasharingframework
Datasharingframework dsf
Dev.dsf
Dev.dsf dsf-bpe-process-api-v2
Dev.dsf dsf-bpe-server
Vendors & Products Datasharingframework
Datasharingframework dsf
Dev.dsf
Dev.dsf dsf-bpe-process-api-v2
Dev.dsf dsf-bpe-server

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description The Data Sharing Framework (DSF) implements a distributed process engine based on the BPMN 2.0 and FHIR R4 standards. Prior to 2.1.0, The OIDC JWKS and Metadata Document caches used an inverted time comparison (isBefore instead of isAfter), causing the cache to never return cached values. Every incoming request triggered a fresh HTTP fetch of the OIDC Metadata Document and JWKS keys from the OIDC provider. The OIDC token cache for the FHIR client connections used an inverted time comparison (isBefore instead of isAfter), causing the cache to never invalidate. Every incoming request returned the same OIDC token even if expired. This vulnerability is fixed in 2.1.0.
Title DSF: Inverted Time Comparison in OIDC JWKS and Token Cache
Weaknesses CWE-670
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-04-21T21:09:44.537Z

Updated: 2026-04-22T18:11:33.794Z

Reserved: 2026-04-15T20:40:15.519Z

Link: CVE-2026-40942

cve-icon Vulnrichment

Updated: 2026-04-22T18:09:06.207Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-21T22:16:19.700

Modified: 2026-04-22T21:23:52.620

Link: CVE-2026-40942

cve-icon Redhat

No data.