


Perceptive Security
SOC/SIEM Consultancy

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a JWK Header Injection vulnerability in authlib's JWS impleme…
Published:
15 maart 2026 om 23:00:00
Alert date:
16 maart 2026 om 19:01:56
Source:
nvd.nist.gov
Web Technologies, Supply Chain & Dependencies, Identity & Access
A JWK Header Injection vulnerability in Authlib's JWS implementation allows unauthenticated attackers to forge arbitrary JWT tokens that pass signature verification. The vulnerability occurs when key=None is passed to JWS deserialization functions, causing the library to extract and use cryptographic keys from the attacker-controlled JWT jwk header field. Attackers can sign tokens with their own private key, embed the matching public key in the header, and bypass authentication and authorization entirely. The issue affects versions prior to 1.6.9 and has been patched in version 1.6.9.
Technical details
Mitigation steps:
Affected products:
Authlib
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-27962
https://github.com/authlib/authlib/commit/a5d4b2d4c9e46bfa11c82f85fdc2bcc0b50ae681
https://github.com/authlib/authlib/releases/tag/v1.6.9
https://github.com/authlib/authlib/security/advisories/GHSA-wvwj-cvrp-7pv5
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
