Home

Description

python-jose thru 3.3.0 allows JWT tokens with 'alg=none' to be decoded and accepted without any cryptographic signature verification. A malicious actor can craft a forged token with arbitrary claims (e.g., is_admin=true) and bypass authentication checks, leading to privilege escalation or unauthorized access in applications that rely on python-jose for token validation. This issue is exploitable unless developers explicitly reject 'alg=none' tokens, which is not enforced by the library.

PUBLISHED Reserved 2025-09-26 | Published 2025-10-10 | Updated 2025-10-10 | Assigner mitre

References

pypi.org/project/python-jose

github.com/.../blob/main/CVE-2025-61152_Security_Advisory.md

cve.org (CVE-2025-61152)

nvd.nist.gov (CVE-2025-61152)

Download JSON