CVE-2025-65015

joserfc is a Python library that provides an implementation of several JSON Object Signing and Encryption (JOSE) standards. In versions from 1.3.3 to before 1.3.5 and from 1.4.0 to before 1.4.2, the ExceededSizeError exception messages are embedded with non-decoded JWT token parts and may cause Python logging to record an arbitrarily large, forged JWT payload. In situations where a misconfigured — or entirely absent — production-grade web server sits in front of a Python web application, an attacker may be able to send arbitrarily large bearer tokens in the HTTP request headers. When this occurs, Python logging or diagnostic tools (e.g., Sentry) may end up processing extremely large log messages containing the full JWT header during the joserfc.jwt.decode() operation. The same behavior also appears when validating claims and signature payload sizes, as the library raises joserfc.errors.ExceededSizeError() with the full payload embedded in the exception message. Since the payload is already fully loaded into memory at this stage, the library cannot prevent or reject it. This issue has been patched in versions 1.3.5 and 1.4.2.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:hsiaoming:joserfc:*:*:*:*:*:python:*:*
cpe:2.3:a:hsiaoming:joserfc:*:*:*:*:*:python:*:*

History

15 Jan 2026, 22:10

Type Values Removed Values Added
References () https://github.com/authlib/joserfc/commit/63932f169d924caffafa761af2122b82059017f7 - () https://github.com/authlib/joserfc/commit/63932f169d924caffafa761af2122b82059017f7 - Patch
References () https://github.com/authlib/joserfc/commit/673c8743fd0605b0e1de6452be6cba75f44e466b - () https://github.com/authlib/joserfc/commit/673c8743fd0605b0e1de6452be6cba75f44e466b - Patch
References () https://github.com/authlib/joserfc/releases/tag/1.3.5 - () https://github.com/authlib/joserfc/releases/tag/1.3.5 - Release Notes
References () https://github.com/authlib/joserfc/releases/tag/1.4.2 - () https://github.com/authlib/joserfc/releases/tag/1.4.2 - Release Notes
References () https://github.com/authlib/joserfc/security/advisories/GHSA-frfh-8v73-gjg4 - () https://github.com/authlib/joserfc/security/advisories/GHSA-frfh-8v73-gjg4 - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:hsiaoming:joserfc:*:*:*:*:*:python:*:*
First Time Hsiaoming joserfc
Hsiaoming

19 Nov 2025, 18:15

Type Values Removed Values Added
References () https://github.com/authlib/joserfc/security/advisories/GHSA-frfh-8v73-gjg4 - () https://github.com/authlib/joserfc/security/advisories/GHSA-frfh-8v73-gjg4 -

18 Nov 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-18 23:15

Updated : 2026-01-15 22:10


NVD link : CVE-2025-65015

Mitre link : CVE-2025-65015

CVE.ORG link : CVE-2025-65015


JSON object : View

Products Affected

hsiaoming

  • joserfc
CWE
CWE-770

Allocation of Resources Without Limits or Throttling