CVE-2026-32597

EUVD-2026-11728
PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
pyjwt_projectpyjwt
𝑥
< 2.12.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pyjwt
bionic
Fixed 1.5.3+ds1-1ubuntu0.1+esm1
released
focal
Fixed 1.7.1-2ubuntu2.1+esm1
released
jammy
Fixed 2.3.0-1ubuntu0.3
released
noble
Fixed 2.7.0-1ubuntu0.1
released
questing
Fixed 2.10.1-2ubuntu0.1
released
xenial
Fixed 1.3.0-1ubuntu0.1+esm1
released