CVE-2025-59420
Python vulnerability analysis and mitigation

Overview

Authlib, a Python library for building OAuth and OpenID Connect servers, was found to have a security vulnerability (CVE-2025-59420) prior to version 1.6.4. The vulnerability was discovered and disclosed on September 22, 2025. The issue affects the JWS verification functionality, which incorrectly accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 'must-understand' semantics (GitHub Advisory).

Technical details

The vulnerability stems from Authlib's JWS verification process not properly enforcing the RFC 7515 §4.1.11 requirements for critical header parameters. When a compact JWS contains a protected header with unknown parameters listed in 'crit' (such as 'cnf' or 'bork'), Authlib verifies the signature and returns the payload without rejecting the token or enforcing semantics of the critical parameter. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.5 (High) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N (GitHub Advisory, NVD).

Impact

The vulnerability can lead to split-brain verification in heterogeneous environments where different JWT verifiers are used. While strict verifiers (like Java Nimbus JOSE+JWT or Node jose v5) correctly reject tokens with unknown critical parameters, Authlib accepts them. This inconsistency can enable policy bypass, replay attacks, or privilege escalation, particularly when 'crit' carries binding or policy information (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Authlib version 1.6.4. The fix enforces proper validation of critical header parameters during verification, rejecting tokens that list any critical parameter that is not explicitly understood and enforced. Users are advised to upgrade to version 1.6.4 or later (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-5882-5rx9-xgxpCRITICAL10
  • PythonPython
  • crawl4ai
NoYesJan 16, 2026
GHSA-vx9w-5cx4-9796HIGH8.6
  • PythonPython
  • crawl4ai
NoYesJan 16, 2026
CVE-2026-23535HIGH8
  • PythonPython
  • wlc
NoYesJan 16, 2026
CVE-2026-23490HIGH7.5
  • PythonPython
  • pyasn1
NoYesJan 16, 2026
CVE-2026-23528MEDIUM5.3
  • PythonPython
  • distributed
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management