CVE-2026-32597

PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:pyjwt_project:pyjwt:*:*:*:*:*:*:*:*

History

19 Mar 2026, 13:30

Type Values Removed Values Added
References () https://github.com/jpadilla/pyjwt/security/advisories/GHSA-752w-5fwx-jx9f - () https://github.com/jpadilla/pyjwt/security/advisories/GHSA-752w-5fwx-jx9f - Exploit, Mitigation, Vendor Advisory
First Time Pyjwt Project pyjwt
Pyjwt Project
CPE cpe:2.3:a:pyjwt_project:pyjwt:*:*:*:*:*:*:*:*

16 Mar 2026, 14:53

Type Values Removed Values Added
Summary
  • (es) PyJWT es una implementación de JSON Web Token en Python. Antes de la 2.12.0, PyJWT no valida el parámetro de encabezado crit (Crítico) definido en la RFC 7515 §4.1.11. Cuando un token JWS contiene un array crit que lista extensiones que PyJWT no entiende, la biblioteca acepta el token en lugar de rechazarlo. Esto viola el requisito MUST en la RFC. Esta vulnerabilidad está corregida en la 2.12.0.

13 Mar 2026, 19:55

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-13 19:55

Updated : 2026-03-19 13:30


NVD link : CVE-2026-32597

Mitre link : CVE-2026-32597

CVE.ORG link : CVE-2026-32597


JSON object : View

Products Affected

pyjwt_project

  • pyjwt
CWE
CWE-345

Insufficient Verification of Data Authenticity

CWE-863

Incorrect Authorization