Medium
IBM Security Verify Access could allow a user, using man in the middle techniques, to obtain sensitive information or possibly change some information due to improper validiation of JWT tokens.
IBM
Refer to IBM Security Bulletin for patch, upgrade or suggested workaround information.