← Retour aux CVEs
CVE-2026-32597
HIGH7.5
Description
PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0.
Details CVE
Score CVSS v3.17.5
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie3/13/2026
Derniere modification3/19/2026
Sourcenvd
Observations honeypot0
Produits affectes
pyjwt_project:pyjwt
Faiblesses (CWE)
CWE-345CWE-863
References
https://github.com/jpadilla/pyjwt/security/advisories/GHSA-752w-5fwx-jx9f(security-advisories@github.com)
https://github.com/jpadilla/pyjwt/security/advisories/GHSA-752w-5fwx-jx9f(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.