An improper access control vulnerability in the JWT plugin in Kong Gateway prior to 2.3.2.0 allows unauthenticated users access to authenticated routes without a valid token JWT.
The product uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.