Description
SciTokens C++ is a minimal library for creating and using SciTokens from C or C++. Prior to version 1.4.1, scitokens-cpp is vulnerable to an authorization bypass in path-based scope validation. The enforcer used a simple string-prefix comparison when checking whether a requested resource path was covered by a token's authorized scope path. Because the check did not require a path-segment boundary, a token scoped to one path could incorrectly authorize access to sibling paths that merely started with the same prefix. This issue has been patched in version 1.4.1.
Published: 2026-03-31
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Authorization bypass via path prefix comparison
Action: Immediate Patch
AI Analysis

Impact

SciTokens C++ validates token scopes by comparing requested resource paths to the authorized scope using a simple string‑prefix check. Because the comparison does not enforce a full path segment boundary, a token that is limited to a specific path can incorrectly be granted access to sibling paths that begin with the same prefix. This allows an attacker who possesses a scoped token to request and receive resources outside its legitimate scope, leading to unauthorized data access.

Affected Systems

All releases of the SciTokens C++ library published before version 1.4.1 are affected. The library is known as scitokens:scitokens-cpp. Versions 1.4.1 and later include a fix that enforces proper path segment boundaries and no longer suffer from the bypass.

Risk and Exploitability

The vulnerability carries a high severity score of 8.1, indicating a significant impact. Exploitation requires only a legitimately scoped token and does not need additional system compromise. While the probability of exploitation is currently considered low, the potential for unauthorized data access warrants prompt remediation. The issue is not listed in the known exploited vulnerability catalog.

Generated by OpenCVE AI on April 13, 2026 at 20:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SciTokens C++ to version 1.4.1 or later

Generated by OpenCVE AI on April 13, 2026 at 20:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Scitokens scitokens Cpp Library
CPEs cpe:2.3:a:scitokens:scitokens_cpp_library:*:*:*:*:*:*:*:*
Vendors & Products Scitokens scitokens Cpp Library

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Scitokens
Scitokens scitokens-cpp
Vendors & Products Scitokens
Scitokens scitokens-cpp

Tue, 31 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description SciTokens C++ is a minimal library for creating and using SciTokens from C or C++. Prior to version 1.4.1, scitokens-cpp is vulnerable to an authorization bypass in path-based scope validation. The enforcer used a simple string-prefix comparison when checking whether a requested resource path was covered by a token's authorized scope path. Because the check did not require a path-segment boundary, a token scoped to one path could incorrectly authorize access to sibling paths that merely started with the same prefix. This issue has been patched in version 1.4.1.
Title SciTokens C++: Sibling-Path Authorization Bypass
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Scitokens Scitokens-cpp Scitokens Cpp Library
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T19:09:02.060Z

Reserved: 2026-03-13T15:02:00.625Z

Link: CVE-2026-32726

cve-icon Vulnrichment

Updated: 2026-03-31T19:04:22.171Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T18:16:50.997

Modified: 2026-04-13T17:03:28.610

Link: CVE-2026-32726

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:42:21Z

Weaknesses