CVE-2025-61152

python-jose thru 3.3.0 allows JWT tokens with 'alg=none' to be decoded and accepted without any cryptographic signature verification. A malicious actor can craft a forged token with arbitrary claims (e.g., is_admin=true) and bypass authentication checks, leading to privilege escalation or unauthorized access in applications that rely on python-jose for token validation. This issue is exploitable unless developers explicitly reject 'alg=none' tokens, which is not enforced by the library.
Configurations

No configuration.

History

10 Oct 2025, 15:16

Type Values Removed Values Added
CWE CWE-269
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

10 Oct 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-10 14:15

Updated : 2025-10-14 19:36


NVD link : CVE-2025-61152

Mitre link : CVE-2025-61152

CVE.ORG link : CVE-2025-61152


JSON object : View

Products Affected

No product.

CWE
CWE-269

Improper Privilege Management