Impact
A malicious JWT containing the algorithm field set to 'none' and an empty signature allows an attacker to bypass the signature verification step in Authlib. As a result, forged tokens can be accepted, providing the attacker with unauthorized access and the ability to impersonate other users. The flaw is classified as CWE-347, indicating broken authentication.
Affected Systems
Authlib library versions from 1.6.5 up to, but not including, 1.6.7 are affected. Applications that use these versions to validate OAuth or OpenID Connect tokens are at risk.
Risk and Exploitability
The vulnerability has a CVSS score of 7.7, indicating high severity. Its EPSS score is less than 1%, signifying a low likelihood of exploitation at present, and it is not listed in the CISA KEV catalog. Attackers can exploit the flaw by crafting a JWT with 'alg:none' and no signature, which can then be processed by any application that relies on Authlib without additional checks.
OpenCVE Enrichment
Github GHSA