Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7wc2-qxgw-g8gg | Authlib: Setting `alg: none` and a blank signature appears to bypass signature verification |
Mon, 09 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:authlib:authlib:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 06 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Authlib
Authlib authlib |
|
| Vendors & Products |
Authlib
Authlib authlib |
Fri, 06 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 06 Mar 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authlib is a Python library which builds OAuth and OpenID Connect servers. From version 1.6.5 to before version 1.6.7, previous tests involving passing a malicious JWT containing alg: none and an empty signature was passing the signature verification step without any changes to the application code when a failure was expected.. This issue has been patched in version 1.6.7. | |
| Title | Authlib: Setting `alg: none` and a blank signature appears to bypass signature verification | |
| Weaknesses | CWE-347 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-06T16:05:35.082Z
Reserved: 2026-03-03T14:25:19.246Z
Link: CVE-2026-28802
Updated: 2026-03-06T16:00:06.142Z
Status : Analyzed
Published: 2026-03-06T07:16:01.053
Modified: 2026-03-09T21:20:56.980
Link: CVE-2026-28802
OpenCVE Enrichment
Updated: 2026-04-16T11:45:26Z
Github GHSA