CVE-2025-65015
Python vulnerability analysis and mitigation

Overview

CVE-2025-65015 affects joserfc, a Python library that implements JSON Object Signing and Encryption (JOSE) standards. The vulnerability was discovered in versions >=1.3.3 and <= 1.4.1, with patches released in versions 1.3.5 and 1.4.2. The issue involves the ExceededSizeError exception messages containing non-decoded JWT token parts that could potentially cause Python logging to record arbitrarily large, forged JWT payloads (GitHub Advisory).

Technical details

The vulnerability is classified as an Allocation of Resources Without Limits or Throttling (CWE-770) issue. When processing JWT tokens, the library embeds the full payload in exception messages during validation of header, payload, and signature sizes. This occurs in multiple validation methods within the codebase, specifically in joserfc/rfc7515/registry.py and joserfc/rfc7516/registry.py. The CVSS v4.0 score is 9.2 (Critical), with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H (GitHub Advisory).

Impact

In scenarios where a web application does not reject excessively large HTTP header payloads, the vulnerability can lead to system resource exhaustion affecting disk, memory, and CPU on the application host. Additionally, it may impact external log storage, ingestion pipelines, and alerting services. The issue becomes particularly concerning when the application runs without proper web server configurations that would normally limit header sizes (GitHub Advisory).

Mitigation and workarounds

The issue has been patched in joserfc versions 1.3.5 and 1.4.2. Users should upgrade to these patched versions. Additionally, it is recommended to deploy the library behind a robust web server or reverse proxy that correctly enforces maximum request header sizes. For example, using nginx can explicitly cap maximum header size (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55449CRITICAL9.8
  • PythonPython
  • astrbot
NoYesNov 14, 2025
CVE-2025-65015CRITICAL9.2
  • PythonPython
  • localstack
NoYesNov 18, 2025
CVE-2025-60455HIGH8.4
  • PythonPython
  • modular
NoYesNov 18, 2025
CVE-2025-65073HIGH7.5
  • PythonPython
  • keystone
NoYesNov 17, 2025
CVE-2025-12765HIGH7.4
  • PythonPython
  • cpe:2.3:a:pgadmin:pgadmin
NoYesNov 13, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management