CVE-2025-59420

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.4, Authlib’s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 “must‑understand” semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed‑language fleets, this enables split‑brain verification and can lead to policy bypass, replay, or privilege escalation. This issue has been patched in version 1.6.4.
Configurations

No configuration.

History

22 Sep 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-22 18:15

Updated : 2025-09-22 21:22


NVD link : CVE-2025-59420

Mitre link : CVE-2025-59420

CVE.ORG link : CVE-2025-59420


JSON object : View

Products Affected

No product.

CWE
CWE-345

Insufficient Verification of Data Authenticity

CWE-863

Incorrect Authorization