JSON Web Tokens (JWT) are commonly used for securely transmitting information between parties as a JSON object. However, when JWTs are signed using HMAC (Hash-based Message Authentication Code) with a weak or hardcoded secret key, they become vulnerable to brute-force or dictionary attacks.
An attacker can exploit this by:
This compromises authentication, authorization, and session integrity of the application.