top of page
perceptive_background_267k.jpg

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a JWK Header Injection vulnerability in authlib's JWS impleme…

Published:

15 maart 2026 om 23:00:00

Alert date:

16 maart 2026 om 19:01:56

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Supply Chain & Dependencies, Identity & Access

A JWK Header Injection vulnerability in Authlib's JWS implementation allows unauthenticated attackers to forge arbitrary JWT tokens that pass signature verification. The vulnerability occurs when key=None is passed to JWS deserialization functions, causing the library to extract and use cryptographic keys from the attacker-controlled JWT jwk header field. Attackers can sign tokens with their own private key, embed the matching public key in the header, and bypass authentication and authorization entirely. The issue affects versions prior to 1.6.9 and has been patched in version 1.6.9.

Technical details

Mitigation steps:

Affected products:

Authlib

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page