Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32597: CWE-345: Insufficient Verification of Data Authenticity in jpadilla pyjwt

0
High
VulnerabilityCVE-2026-32597cvecve-2026-32597cwe-345cwe-863
Published: Thu Mar 12 2026 (03/12/2026, 21:41:50 UTC)
Source: CVE Database V5
Vendor/Project: jpadilla
Product: pyjwt

Description

CVE-2026-32597 is a high-severity vulnerability in the PyJWT Python library prior to version 2. 12. 0. The issue arises because PyJWT does not validate the 'crit' (Critical) header parameter in JSON Web Signature (JWS) tokens as required by RFC 7515 §4. 1. 11. When a token includes a 'crit' array listing extensions that PyJWT does not recognize, the library incorrectly accepts the token instead of rejecting it. This behavior violates the RFC's mandatory rejection requirement, potentially allowing attackers to bypass intended security controls or introduce unverified extensions. The vulnerability impacts the integrity of token validation but does not affect confidentiality or availability. Exploitation requires no privileges or user interaction and can be performed remotely.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 02:38:17 UTC

Technical Analysis

PyJWT is a widely used Python library for creating and verifying JSON Web Tokens (JWTs), which are commonly employed for authentication and authorization in web applications and APIs. The vulnerability identified as CVE-2026-32597 stems from PyJWT's failure to properly validate the 'crit' (Critical) header parameter in JWS tokens prior to version 2.12.0. According to RFC 7515 §4.1.11, the 'crit' header indicates which extensions are critical for processing the token, and any extensions listed therein that the implementation does not understand must cause the token to be rejected. PyJWT's improper handling means that tokens containing unknown critical extensions are accepted rather than rejected, violating the RFC's MUST requirement. This can allow attackers to craft malicious tokens with unrecognized critical extensions that bypass security checks or introduce unauthorized claims, undermining the integrity of the token validation process. The vulnerability does not impact confidentiality or availability directly but compromises the trustworthiness of token-based authentication. Exploitation is straightforward as it requires no authentication or user interaction and can be executed remotely by submitting crafted tokens to vulnerable services. The issue is resolved in PyJWT version 2.12.0, where proper validation of the 'crit' header is enforced. No known exploits are currently reported in the wild, but the high CVSS score of 7.5 reflects the significant risk posed by this flaw.

Potential Impact

The vulnerability affects the integrity of JWT validation in applications using PyJWT versions prior to 2.12.0. Attackers can exploit this flaw to bypass security controls by presenting tokens with unrecognized critical extensions that are accepted rather than rejected. This can lead to unauthorized access, privilege escalation, or manipulation of application logic that relies on JWT claims for authorization decisions. Since JWTs are widely used for session management, API authentication, and federated identity, the impact can be broad, affecting web applications, microservices, and APIs globally. The flaw does not compromise confidentiality or availability directly but undermines trust in authentication mechanisms, potentially enabling attackers to impersonate users or escalate privileges without detection. Organizations relying on PyJWT for security-critical functions face increased risk of unauthorized access and data integrity violations until patched.

Mitigation Recommendations

The primary mitigation is to upgrade PyJWT to version 2.12.0 or later, where the 'crit' header parameter is properly validated in compliance with RFC 7515. Organizations should audit their codebases and dependencies to identify usage of vulnerable PyJWT versions and prioritize patching. Additionally, implement defense-in-depth by validating JWTs at multiple layers, including API gateways or identity providers, to detect malformed or suspicious tokens. Employ strict token validation policies that reject tokens with unknown or unexpected header parameters. Monitoring and logging JWT validation failures can help detect exploitation attempts. For environments where immediate upgrade is not feasible, consider implementing custom validation logic to enforce 'crit' header checks or temporarily disable acceptance of tokens with critical extensions until patched. Finally, educate developers and security teams about the importance of adhering to JWT standards and promptly applying security updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-12T14:54:24.269Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b3375b2f860ef943024596

Added to database: 3/12/2026, 9:59:55 PM

Last enriched: 3/20/2026, 2:38:17 AM

Last updated: 4/27/2026, 12:16:47 AM

Views: 275

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses