CVE-2026-28802
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to bypass security checks by sending a specially crafted JSON Web Token (JWT) that appears valid, even though it should be rejected. It affects versions of the Authlib library from 1.6.5 to just before 1.6.7, meaning any applications using these versions could be tricked into accepting unauthorized access without proper verification.
Technical Description
Authlib is a Python library which builds OAuth and OpenID Connect servers. From version 1.6.5 to before version 1.6.7, previous tests involving passing a malicious JWT containing alg: none and an empty signature was passing the signature verification step without any changes to the application code when a failure was expected.. This issue has been patched in version 1.6.7.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 6, 2026
about 1 month ago
Last Modified
Mar 9, 2026
29 days ago
Vendor
authlib
Product
authlib