Ad

CVE-2026-27962

CRITICAL CVSS 3.1: 9.1 EPSS 0.07%
Updated Mar 17, 2026
Python
Parameter Value
CVSS 9.1 (CRITICAL)
Affected Versions before 1.6.9
Fixed In 1.6.9
Type CWE-347 (Improper Verification of Cryptographic Signature)
Vendor Python
Public PoC No

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a JWK Header Injection vulnerability in authlib's JWS implementation allows an unauthenticated attacker to forge arbitrary JWT tokens that pass signature verification. When key=None is passed to any JWS deserialization function, the library extracts and uses the cryptographic key embedded in the attacker-controlled JWT jwk header field.

An attacker can sign a token with their own private key, embed the matching public key in the header, and have the server accept the forged token as cryptographically valid — bypassing authentication and authorization entirely. This issue has been patched in version 1.6.9.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Authlib Authlib
cpe:2.3:a:authlib:authlib:*:*:*:*:*:*:*:*
1.6.9