CVE-2025-61152 Affecting python-jose package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-PYTHONJOSE-13534782
  • published12 Oct 2025
  • disclosed10 Oct 2025

Introduced: 10 Oct 2025

NewCVE-2025-61152  (opens in a new tab)

How to fix?

There is no fixed version for Debian:12 python-jose.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-jose package and not the python-jose package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

python-jose thru 3.3.0 allows JWT tokens with 'alg=none' to be decoded and accepted without any cryptographic signature verification. A malicious actor can craft a forged token with arbitrary claims (e.g., is_admin=true) and bypass authentication checks, leading to privilege escalation or unauthorized access in applications that rely on python-jose for token validation. This issue is exploitable unless developers explicitly reject 'alg=none' tokens, which is not enforced by the library.