Skip to content

fix: bump PyJWT to 2.12.1 (CVE-2026-32597)#70

Merged
Otoru merged 1 commit intomainfrom
fix/pyjwt-cve-2026-32597
Mar 21, 2026
Merged

fix: bump PyJWT to 2.12.1 (CVE-2026-32597)#70
Otoru merged 1 commit intomainfrom
fix/pyjwt-cve-2026-32597

Conversation

@Otoru
Copy link
Owner

@Otoru Otoru commented Mar 21, 2026

Summary

  • Bumps PyJWT from 2.10.1 to 2.12.1 in poetry.lock
  • PyJWT is a transitive dependency pulled in by the optional redis extra
  • Fixes GHSA-752w-5fwx-jx9f / CVE-2026-32597 (CVSS 7.5 HIGH)

Vulnerability: PyJWT <= 2.11.0 does not validate the crit (Critical) Header Parameter per RFC 7515 §4.1.11. Tokens with unknown critical extensions are silently accepted instead of rejected, enabling security policy bypass (MFA, token binding, scope restrictions).

Closes https://github.com/Otoru/Genesis/security/dependabot/10

🤖 Generated with Claude Code

PyJWT <= 2.11.0 does not validate the `crit` (Critical) Header
Parameter per RFC 7515 §4.1.11, allowing tokens with unknown critical
extensions to be accepted. Fixed in 2.12.0.

GHSA-752w-5fwx-jx9f / CVE-2026-32597 (CVSS 7.5 HIGH)

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
@Otoru Otoru force-pushed the fix/pyjwt-cve-2026-32597 branch from efcb450 to 07aaace Compare March 21, 2026 03:25
@Otoru Otoru merged commit fe7ddac into main Mar 21, 2026
11 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant