Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. authlib
  4. ›
  5. CVE-2025-59420

CVE-2025-59420: Authlib: JWS/JWT accepts unknown crit headers (RFC violation → possible authz bypass)

September 22, 2025

Authlib’s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 “must‑understand” semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed‑language fleets, this enables split‑brain verification and can lead to policy bypass, replay, or privilege escalation.

References

  • github.com/advisories/GHSA-9ggr-2464-2j32
  • github.com/authlib/authlib
  • github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df
  • github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32
  • nvd.nist.gov/vuln/detail/CVE-2025-59420

Code Behaviors & Features

Detect and mitigate CVE-2025-59420 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.6.4

Fixed versions

  • 1.6.4

Solution

Upgrade to version 1.6.4 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-345: Insufficient Verification of Data Authenticity
  • CWE-863: Incorrect Authorization

Source file

pypi/authlib/CVE-2025-59420.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 08 Oct 2025 00:20:37 +0000.