CVE-2025-59420

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-59420
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-59420.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-59420
Aliases
Downstream
Related
Published
2025-09-22T17:28:53Z
Modified
2025-11-06T16:14:49.488128Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Authlib: JWS/JWT accepts unknown crit headers (RFC violation → possible authz bypass)
Details

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.4, Authlib’s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 “must‑understand” semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed‑language fleets, this enables split‑brain verification and can lead to policy bypass, replay, or privilege escalation. This issue has been patched in version 1.6.4.

Database specific
{
    "cwe_ids": [
        "CWE-345",
        "CWE-863"
    ]
}
References

Affected packages

Git / github.com/authlib/authlib

Affected ranges

Type
GIT
Repo
https://github.com/authlib/authlib
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1
v0.10
v0.11
v0.12
v0.13
v0.14
v0.14.1
v0.14.2
v0.14.3
v0.15
v0.15.1
v0.2
v0.2.1
v0.3
v0.4
v0.4.1
v0.5
v0.5.1
v0.6
v0.7
v0.8
v0.9

v1.*

v1.0.0
v1.0.1
v1.1.0
v1.2.0
v1.2.1
v1.3.0
v1.3.1
v1.3.2
v1.4.0
v1.4.1
v1.5.0
v1.5.1
v1.5.2
v1.6.0
v1.6.1
v1.6.2
v1.6.3

Git / github.com/lepture/authlib

Affected ranges

Type
GIT
Repo
https://github.com/lepture/authlib
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1
v0.10
v0.11
v0.12
v0.13
v0.14
v0.14.1
v0.14.2
v0.14.3
v0.15
v0.15.1
v0.2
v0.2.1
v0.3
v0.4
v0.4.1
v0.5
v0.5.1
v0.6
v0.7
v0.8
v0.9

v1.*

v1.0.0
v1.0.1
v1.1.0
v1.2.0
v1.2.1
v1.3.0
v1.3.1
v1.3.2
v1.4.0
v1.4.1
v1.5.0
v1.5.1
v1.5.2
v1.6.0
v1.6.1
v1.6.2
v1.6.3