CVE-2025-59420: Authlib: JWS/JWT accepts unknown crit headers (RFC violation → possible authz bypass)
Authlib’s JWS verification accepts tokens that declare unknown critical header parameters (crit
), violating RFC 7515 “must‑understand” semantics. An attacker can craft a signed token with a critical header (for example, bork
or cnf
) that strict verifiers reject but Authlib accepts. In mixed‑language fleets, this enables split‑brain verification and can lead to policy bypass, replay, or privilege escalation.
References
Code Behaviors & Features
Detect and mitigate CVE-2025-59420 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →