Bug 2447194 (CVE-2026-32597)

Summary: CVE-2026-32597 pyjwt: PyJWT accepts unknown `crit` header extensions (RFC 7515 §4.1.11 MUST violation)
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: abeisemb, adudiak, alinfoot, anpicker, anthomas, aprice, bbrownin, bdettelb, bparees, caswilli, cmyers, dfreiber, dnakabaa, doconnor, drow, dschmidt, dtrifiro, eborisov, ebourniv, ehelms, erezende, ggainey, hasun, jburrell, jfula, jkoehler, jlanda, jmitchel, jowilson, jsamir, juwatts, jwong, kaycoth, kshier, lball, lcouzens, lgallett, ljawale, lphiri, luizcosta, mhulan, ngough, nmoumoul, nweather, nyancey, oezr, omaciel, ometelka, osousa, pbohmill, pcreech, ptisnovs, rbobbitt, rbryant, rchan, rhel-process-autobot, sbunciak, simaishi, smallamp, smcdonal, stcannon, syedriko, teagle, tmalecek, ttakamiy, veshanka, vkumar, watson-tool-maintainers, weaton, xdharmai, yguenane
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A missing verification step has been discovered in PyJWT. PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2026-03-12 22:01:52 UTC
PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0.

Comment 4 errata-xmlrpc 2026-04-30 10:05:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:12176 https://access.redhat.com/errata/RHSA-2026:12176

Comment 5 errata-xmlrpc 2026-05-04 13:58:49 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.6 for RHEL 10
  Red Hat Ansible Automation Platform 2.6 for RHEL 9

Via RHSA-2026:13508 https://access.redhat.com/errata/RHSA-2026:13508

Comment 6 errata-xmlrpc 2026-05-04 14:16:07 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.5 for RHEL 9
  Red Hat Ansible Automation Platform 2.5 for RHEL 8

Via RHSA-2026:13512 https://access.redhat.com/errata/RHSA-2026:13512

Comment 7 errata-xmlrpc 2026-05-05 10:23:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:13672 https://access.redhat.com/errata/RHSA-2026:13672

Comment 8 errata-xmlrpc 2026-05-06 06:33:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:13916 https://access.redhat.com/errata/RHSA-2026:13916

Comment 10 errata-xmlrpc 2026-05-13 15:22:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:17083 https://access.redhat.com/errata/RHSA-2026:17083