Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.4, Authlib’s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 “must‑understand” semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed‑language fleets, this enables split‑brain verification and can lead to policy bypass, replay, or privilege escalation. This issue has been patched in version 1.6.4.
Metrics
Affected Vendors & Products
References
History
Tue, 23 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Authlib
Authlib authlib |
|
Vendors & Products |
Authlib
Authlib authlib |
Tue, 23 Sep 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Mon, 22 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 22 Sep 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.4, Authlib’s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 “must‑understand” semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed‑language fleets, this enables split‑brain verification and can lead to policy bypass, replay, or privilege escalation. This issue has been patched in version 1.6.4. | |
Title | Authlib: JWS/JWT accepts unknown crit headers (RFC violation → possible authz bypass) | |
Weaknesses | CWE-345 CWE-863 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-22T17:28:53.869Z
Updated: 2025-09-22T18:05:49.981Z
Reserved: 2025-09-15T19:13:16.904Z
Link: CVE-2025-59420

Updated: 2025-09-22T18:04:57.627Z

Status : Awaiting Analysis
Published: 2025-09-22T18:15:46.910
Modified: 2025-09-22T21:22:33.590
Link: CVE-2025-59420
