CVE-2026-27962
CRITICALAuthlib JWS JWK Header Injection: Signature Verification Bypass
Title source: cnaDescription
Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a JWK Header Injection vulnerability in authlib's JWS implementation allows an unauthenticated attacker to forge arbitrary JWT tokens that pass signature verification. When key=None is passed to any JWS deserialization function, the library extracts and uses the cryptographic key embedded in the attacker-controlled JWT jwk header field. An attacker can sign a token with their own private key, embed the matching public key in the header, and have the server accept the forged token as cryptographically valid — bypassing authentication and authorization entirely. This issue has been patched in version 1.6.9.
References (3)
Scores
CVSS v3
9.1
EPSS
0.0007
EPSS Percentile
22.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-347
Status
published
Products (2)
authlib/authlib
< 1.6.9 (2 CPE variants)
pypi/authlib
0 - 1.6.9PyPI
Published
Mar 16, 2026
Tracked Since
Mar 16, 2026