CVE-2026-32597

PyJWT · PyJWT

PyJWT, a Python implementation of JSON Web Token, contains a vulnerability that could compromise token integrity or verification processes.

Executive summary

A high-severity vulnerability in the PyJWT library threatens the integrity of JSON Web Token (JWT) authentication, potentially allowing attackers to bypass security controls.

Vulnerability

This vulnerability involves a flaw in the PyJWT library's handling of token processing or verification. While specific function names are not provided, the flaw likely impacts the core authentication logic used by applications relying on this Python implementation.

Business impact

A successful exploit could lead to unauthorized access to sensitive application features or administrative interfaces. Given the CVSS score of 7.5, this high-severity flaw poses a significant risk of data breaches and identity spoofing, as JWTs are frequently used for session management and identity propagation in modern web architectures.

Remediation

Immediate Action: Update the PyJWT library to the latest patched version via pip or your preferred package manager immediately.

Proactive Monitoring: Review application logs for unusual authentication patterns or failed token validation attempts that might indicate exploitation testing.

Compensating Controls: Implement strict input validation for all JWT headers and ensure that the library is configured to explicitly require secure signing algorithms (e.g., RS256).

Exploitation status

Public Exploit Available: false

Analyst recommendation

The high CVSS score of 7.5 underscores the urgency of this advisory. Organizations using PyJWT must prioritize updating their dependencies across all environments to mitigate the risk of authentication bypass. Failure to patch could leave applications vulnerable to sophisticated session hijacking attacks.