CVE-2025-45768
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-07-31
Last updated on: 2025-09-12
Assigner: MITRE
Description
Description
pyjwt v2.10.1 was discovered to contain weak encryption. NOTE: this is disputed by the Supplier because the key length is chosen by the application that uses the library (admittedly, library users may benefit from a minimum value and a mechanism for opting in to strict enforcement).
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pyjwt_project | pyjwt | 2.10.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-311 | The product does not encrypt sensitive or critical information before storage or transmission. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in pyjwt version 2.10.1 involves weak encryption, which means the cryptographic protections used by the software are insufficient or flawed, potentially allowing attackers to compromise the security of data or tokens handled by pyjwt.
How can this vulnerability impact me? :
The weak encryption vulnerability can lead to unauthorized access or manipulation of data, resulting in potential data breaches, loss of data integrity, and denial of service. According to the CVSS score, it can impact confidentiality, integrity, and availability to varying degrees.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70