CVE-2025-59420: Authlib: JWS/JWT accepts unknown crit headers (RFC violation → possible authz bypass)
(updated )
Authlib’s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 “must‑understand” semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed‑language fleets, this enables split‑brain verification and can lead to policy bypass, replay, or privilege escalation.
References
- github.com/advisories/GHSA-9ggr-2464-2j32
- github.com/authlib/authlib
- github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df
- github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32
- lists.debian.org/debian-lts-announce/2025/10/msg00032.html
- nvd.nist.gov/vuln/detail/CVE-2025-59420
Code Behaviors & Features
Detect and mitigate CVE-2025-59420 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →