Description
SciTokens C++ is a minimal library for creating and using SciTokens from C or C++. Prior to version 1.4.1, scitokens-cpp is vulnerable to an authorization bypass when processing path-based scopes in tokens. The library normalizes the scope path from the token before authorization and collapses ".." path components instead of rejecting them. As a result, an attacker can use parent-directory traversal in the scope claim to broaden the effective authorization beyond the intended directory. This issue has been patched in version 1.4.1.
Published: 2026-03-31
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Authorization Bypass through relative path traversal in scope fragments
Action: Immediate Patch
AI Analysis

Impact

SciTokens C++ permits a library user to process path-based scopes contained in a token and normalizes those paths by collapsing ".." components. Because the library does not reject or control such path traversal, an attacker can supply a scope that includes parent‑directory references and thereby broaden the effective authorization beyond the intended directory. This results in an unauthorized access condition where a token granting access to a sub‑path is transformed into a token that grants access to higher‑level paths, enabling privilege escalation within the application.

Affected Systems

The vulnerability affects the SciTokens C++ library distributed under the scitokens:scitokens-cpp identifier. All releases prior to version 1.4.1 are impacted. The fix was introduced in version 1.4.1, which corrects the normalization behavior.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.3, indicating high severity, but its EPSS score is below 1 % and it is not listed in the CISA KEV catalog, suggesting a low to moderate likelihood of exploitation in the wild. Exploitation requires an attacker to craft or obtain a token containing a path‑based scope and present it to an application that uses the vulnerable library; thus the attack surface is tied to token acceptance points, which can be remote or local depending on the service design. Attacks would exploit the library’s incorrect handling of path traversal to gain access to resources beyond the intended scope.

Generated by OpenCVE AI on April 13, 2026 at 18:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SciTokens C++ to version 1.4.1 or later, which removes the path‑traversal normalization bug.
  • Verify that all dependent projects and deploy environments use the patched library release and that no legacy versions remain in use.

Generated by OpenCVE AI on April 13, 2026 at 18:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Scitokens scitokens Cpp Library
CPEs cpe:2.3:a:scitokens:scitokens_cpp_library:*:*:*:*:*:*:*:*
Vendors & Products Scitokens scitokens Cpp Library

Fri, 03 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Scitokens
Scitokens scitokens-cpp
Vendors & Products Scitokens
Scitokens scitokens-cpp

Tue, 31 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description SciTokens C++ is a minimal library for creating and using SciTokens from C or C++. Prior to version 1.4.1, scitokens-cpp is vulnerable to an authorization bypass when processing path-based scopes in tokens. The library normalizes the scope path from the token before authorization and collapses ".." path components instead of rejecting them. As a result, an attacker can use parent-directory traversal in the scope claim to broaden the effective authorization beyond the intended directory. This issue has been patched in version 1.4.1.
Title SciTokens C++: Relative Path Traversal Vulnerability
Weaknesses CWE-23
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}


Subscriptions

Scitokens Scitokens-cpp Scitokens Cpp Library
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T16:14:20.163Z

Reserved: 2026-03-13T15:02:00.625Z

Link: CVE-2026-32725

cve-icon Vulnrichment

Updated: 2026-04-03T16:14:14.903Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T18:16:50.837

Modified: 2026-04-13T17:16:08.350

Link: CVE-2026-32725

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:42:20Z

Weaknesses