CVE-2025-65015
BaseFortify
Publication date: 2025-11-18
Last updated on: 2025-11-19
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| joserfc | joserfc | 1.3.4 |
| joserfc | joserfc | 1.3.3 |
| joserfc | joserfc | 1.4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the joserfc Python library versions 1.3.3 to before 1.3.5 and 1.4.0 to before 1.4.2. When the library raises an ExceededSizeError due to large JWT token parts, the exception message includes the full, non-decoded JWT payload. If a misconfigured or absent production-grade web server allows an attacker to send very large bearer tokens in HTTP headers, Python logging or diagnostic tools may log these large payloads. This can lead to processing and storing arbitrarily large log messages containing the full JWT header, potentially causing resource exhaustion or other issues. The vulnerability is patched in versions 1.3.5 and 1.4.2.
How can this vulnerability impact me? :
An attacker can exploit this vulnerability by sending very large JWT bearer tokens to a vulnerable Python web application using joserfc. This can cause the applicationβs logging or diagnostic tools to process and store extremely large log messages, potentially leading to resource exhaustion, degraded performance, or denial of service. It may also expose sensitive JWT token data in logs if the tokens are forged or maliciously crafted.
What immediate steps should I take to mitigate this vulnerability?
Upgrade the joserfc Python library to version 1.3.5 or later, or 1.4.2 or later, as these versions contain patches that fix the vulnerability.