PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0.
References
| Link | Resource |
|---|---|
| https://github.com/jpadilla/pyjwt/security/advisories/GHSA-752w-5fwx-jx9f | Exploit Mitigation Vendor Advisory |
| https://github.com/jpadilla/pyjwt/security/advisories/GHSA-752w-5fwx-jx9f | Exploit Mitigation Vendor Advisory |
Configurations
History
19 Mar 2026, 13:30
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/jpadilla/pyjwt/security/advisories/GHSA-752w-5fwx-jx9f - Exploit, Mitigation, Vendor Advisory | |
| First Time |
Pyjwt Project pyjwt
Pyjwt Project |
|
| CPE | cpe:2.3:a:pyjwt_project:pyjwt:*:*:*:*:*:*:*:* |
16 Mar 2026, 14:53
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
13 Mar 2026, 19:55
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-13 19:55
Updated : 2026-03-19 13:30
NVD link : CVE-2026-32597
Mitre link : CVE-2026-32597
CVE.ORG link : CVE-2026-32597
JSON object : View
Products Affected
pyjwt_project
- pyjwt
