Bug 2448164 (CVE-2026-27962) - CVE-2026-27962 authlib: Authlib: Authentication bypass due to JWK Header Injection vulnerability
Summary: CVE-2026-27962 authlib: Authlib: Authentication bypass due to JWK Header Inje...
Keywords:
Status: NEW
Alias: CVE-2026-27962
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-16 18:02 UTC by OSIDB Bzimport
Modified: 2026-03-17 17:31 UTC (History)
37 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-16 18:02:31 UTC
Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a JWK Header Injection vulnerability in authlib's JWS implementation allows an unauthenticated attacker to forge arbitrary JWT tokens that pass signature verification. When key=None is passed to any JWS deserialization function, the library extracts and uses the cryptographic key embedded in the attacker-controlled JWT jwk header field. An attacker can sign a token with their own private key, embed the matching public key in the header, and have the server accept the forged token as cryptographically valid — bypassing authentication and authorization entirely. This issue has been patched in version 1.6.9.


Note You need to log in before you can comment on or make changes to this bug.