Source: pyjwt
Version: 2.11.0-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for pyjwt.

CVE-2026-32597[0]:
| PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0,
| PyJWT does not validate the crit (Critical) Header Parameter defined
| in RFC 7515 ยง4.1.11. When a JWS token contains a crit array listing
| extensions that PyJWT does not understand, the library accepts the
| token instead of rejecting it. This violates the MUST requirement in
| the RFC. This vulnerability is fixed in 2.12.0.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-32597
    https://www.cve.org/CVERecord?id=CVE-2026-32597
[1] https://github.com/jpadilla/pyjwt/security/advisories/GHSA-752w-5fwx-jx9f
[2] 
https://github.com/jpadilla/pyjwt/commit/051ea341b5573fe3edcd53042f347929b92c2b92

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to