Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. python-jwt
  4. ›
  5. CVE-2022-39227

CVE-2022-39227: Authentication Bypass by Spoofing

September 23, 2022 (updated March 4, 2023)

python-jwt is a module for generating and verifying JSON Web Tokens. Versions prior to 3.3.4 are subject to Authentication Bypass by Spoofing, resulting in identity spoofing, session hijacking or authentication bypass. An attacker who obtains a JWT can arbitrarily forge its contents without knowing the secret key. Depending on the application, this may for example enable the attacker to spoof other user’s identities, hijack their sessions, or bypass authentication. Users should upgrade to version 3.3.4. There are no known workarounds.

References

  • github.com/advisories/GHSA-5p8v-58qm-c7fp
  • github.com/davedoesdev/python-jwt/commit/6c5075469847b9e8b6e5336077d989d77a4d2bf1
  • github.com/davedoesdev/python-jwt/commit/88ad9e67c53aa5f7c43ec4aa52ed34b7930068c9
  • github.com/davedoesdev/python-jwt/security/advisories/GHSA-5p8v-58qm-c7fp
  • github.com/pypa/advisory-database/blob/main/vulns/python-jwt/PYSEC-2022-259.yaml
  • nvd.nist.gov/vuln/detail/CVE-2022-39227

Code Behaviors & Features

Detect and mitigate CVE-2022-39227 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.0.0 before 3.3.4

Fixed versions

  • 3.3.4

Solution

Upgrade to version 3.3.4 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-290: Authentication Bypass by Spoofing

Source file

pypi/python-jwt/CVE-2022-39227.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:59 +0000.