Логотип exploitDog
bind:CVE-2026-32597
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-32597

Количество 5

Количество 5

ubuntu логотип

CVE-2026-32597

14 дней назад

PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2026-32597

15 дней назад

A missing verification step has been discovered in PyJWT. PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2026-32597

14 дней назад

PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2026-32597

14 дней назад

PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, P ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-752w-5fwx-jx9f

14 дней назад

PyJWT accepts unknown `crit` header extensions

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-32597

PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0.

CVSS3: 7.5
0%
Низкий
14 дней назад
redhat логотип
CVE-2026-32597

A missing verification step has been discovered in PyJWT. PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC.

CVSS3: 7.5
0%
Низкий
15 дней назад
nvd логотип
CVE-2026-32597

PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0.

CVSS3: 7.5
0%
Низкий
14 дней назад
debian логотип
CVE-2026-32597

PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, P ...

CVSS3: 7.5
0%
Низкий
14 дней назад
github логотип
GHSA-752w-5fwx-jx9f

PyJWT accepts unknown `crit` header extensions

CVSS3: 7.5
0%
Низкий
14 дней назад

Уязвимостей на страницу