Skip to content

[SNYK] pyjwt@2.10.1 Improper Verification of Cryptographic Signature (High due 4/17/2026) #1935

@exalate-issue-sync

Description

@exalate-issue-sync
  • Introduced through

    pyjwt@2.10.1 and github3.py@4.0.1

  • Fixed in

    pyjwt@2.12.0

  • Exploit maturity

    Proof of Concept

Show less detail

Detailed paths and remediation

  • Introduced through: root@0.0.0 › pyjwt@2.10.1

    Fix: Upgrade pyjwt to version 2.12.0

  • Introduced through: root@0.0.0 › github3.py@4.0.1 › pyjwt@2.10.1

    Fix: Pin pyjwt to version 2.12.0

Security information

Factors contributing to the scoring:

Why are the scores different? Learn how Snyk evaluates vulnerability scores

Overview

Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to improper validation of the crit header parameter. An attacker can bypass critical header checks by crafting a JSON Web Signature (JWS) token with unrecognized critical extensions.

QA Notes

Please test login after this ticket is implemented

DEV Notes

null

Design

null

See full ticket and images here: FECFILE-2961

Pull Request: #1940

Metadata

Metadata

Assignees

Labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions