| Name | CVE-2025-45768 |
| Description | pyjwt v2.10.1 was discovered to contain weak encryption. NOTE: this is disputed by the Supplier because the key length is chosen by the application that uses the library (admittedly, library users may benefit from a minimum value and a mechanism for opting in to strict enforcement). |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 1110318 |
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|
| pyjwt (PTS) | bullseye | 1.7.1-2 | vulnerable |
| bookworm | 2.6.0-1 | vulnerable |
| trixie | 2.10.1-2 | vulnerable |
| forky, sid | 2.10.1-3 | vulnerable |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|
| pyjwt | source | (unstable) | (unfixed) | unimportant | | 1110318 |
Notes
disputed upstream, negligible security impact, cf.
https://github.com/jpadilla/pyjwt/issues/1080#issuecomment-3164212492
https://github.com/advisories/GHSA-xpf8-484v-j9w6
https://github.com/jpadilla/pyjwt/security/advisories/GHSA-72ff-rqxp-4hrh