CVE-2026-32597
Publication date 13 March 2026
Last updated 30 March 2026
Ubuntu priority
Cvss 3 Severity Score
Description
PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 ยง4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| pyjwt | 25.10 questing |
Fixed 2.10.1-2ubuntu0.1
|
| 24.04 LTS noble |
Fixed 2.7.0-1ubuntu0.1
|
|
| 22.04 LTS jammy |
Fixed 2.3.0-1ubuntu0.3
|
|
| 20.04 LTS focal |
Fixed 1.7.1-2ubuntu2.1+esm1
|
|
| 18.04 LTS bionic |
Fixed 1.5.3+ds1-1ubuntu0.1+esm1
|
|
| 16.04 LTS xenial |
Fixed 1.3.0-1ubuntu0.1+esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu Pro 30-day free trialSeverity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | High |
| Availability impact | None |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-8133-1
- PyJWT vulnerability
- 30 March 2026