Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2026-32597

Опубликовано: 13 мар. 2026
Источник: nvd
CVSS3: 7.5
EPSS Низкий

Описание

PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:pyjwt_project:pyjwt:*:*:*:*:*:*:*:*
Версия до 2.12.0 (исключая)

EPSS

Процентиль: 1%
0.00009
Низкий

7.5 High

CVSS3

Дефекты

CWE-345

Связанные уязвимости

CVSS3: 7.5
ubuntu
14 дней назад

PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0.

CVSS3: 7.5
redhat
14 дней назад

A missing verification step has been discovered in PyJWT. PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC.

CVSS3: 7.5
debian
14 дней назад

PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, P ...

CVSS3: 7.5
github
14 дней назад

PyJWT accepts unknown `crit` header extensions

EPSS

Процентиль: 1%
0.00009
Низкий

7.5 High

CVSS3

Дефекты

CWE-345