Description
python-jwt is a module for generating and verifying JSON Web Tokens. Versions prior to 3.3.4 are subject to Authentication Bypass by Spoofing, resulting in identity spoofing, session hijacking or authentication bypass. An attacker who obtains a JWT can arbitrarily forge its contents without knowing the secret key. Depending on the application, this may for example enable the attacker to spoof other user's identities, hijack their sessions, or bypass authentication. Users should upgrade to version 3.3.4. There are no known workarounds.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5p8v-58qm-c7fp | python-jwt vulnerable to token forgery with new claims |
References
History
Thu, 26 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-03T12:00:43.537Z
Reserved: 2022-09-02T00:00:00.000Z
Link: CVE-2022-39227
Updated: 2024-08-03T12:00:43.537Z
Status : Modified
Published: 2022-09-23T07:15:09.300
Modified: 2024-11-21T07:17:49.730
Link: CVE-2022-39227
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA